OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection (Englisch)
- Neue Suche nach: Santos, Igor
- Neue Suche nach: Devesa, Jaime
- Neue Suche nach: Brezo, Félix
- Neue Suche nach: Nieves, Javier
- Neue Suche nach: Bringas, Pablo Garcia
- Neue Suche nach: Herrero, Álvaro
- Neue Suche nach: Snášel, Václav
- Neue Suche nach: Abraham, Ajith
- Neue Suche nach: Zelinka, Ivan
- Neue Suche nach: Baruque, Bruno
- Neue Suche nach: Quintián, Héctor
- Neue Suche nach: Calvo, José Luis
- Neue Suche nach: Sedano, Javier
- Neue Suche nach: Corchado, Emilio
- Neue Suche nach: Santos, Igor
- Neue Suche nach: Devesa, Jaime
- Neue Suche nach: Brezo, Félix
- Neue Suche nach: Nieves, Javier
- Neue Suche nach: Bringas, Pablo Garcia
In:
International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions
;
Kapitel: 28
;
271-280
;
2013
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware Detection
-
Weitere Titelangaben:Advs in Intelligent Syst., Computing
-
Beteiligte:Herrero, Álvaro ( Herausgeber:in ) / Snášel, Václav ( Herausgeber:in ) / Abraham, Ajith ( Herausgeber:in ) / Zelinka, Ivan ( Herausgeber:in ) / Baruque, Bruno ( Herausgeber:in ) / Quintián, Héctor ( Herausgeber:in ) / Calvo, José Luis ( Herausgeber:in ) / Sedano, Javier ( Herausgeber:in ) / Corchado, Emilio ( Herausgeber:in ) / Santos, Igor ( Autor:in )
-
Erschienen in:International Joint Conference CISIS’12-ICEUTE´12-SOCO´12 Special Sessions ; Kapitel: 28 ; 271-280Advances in Intelligent Systems and Computing ; 189 ; 271-280
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2013
-
Format / Umfang:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Automatic Analysis of Web Service Honeypot Data Using Machine Learning TechniquesGhourabi, Abdallah / Abbes, Tarek / Bouhoula, Adel et al. | 2013
- 2
-
A Security Pattern-Driven Approach toward the Automation of Risk Treatment in Business ProcessesVarela-Vaca, Angel Jesus / Warschofsky, Robert / Gasca, Rafael M. / Pozo, Sergio / Meinel, Christoph et al. | 2013
- 3
-
Neural Network Ensembles Design with Self-Configuring Genetic Programming Algorithm for Solving Computer Security ProblemsSemenkin, Eugene / Semenkina, Maria / Panfilov, Ilia et al. | 2013
- 4
-
Clustering for Intrusion Detection: Network Scans as a Case of StudySánchez, Raúl / Herrero, Álvaro / Corchado, Emilio et al. | 2013
- 5
-
Sensor Networks Security Based on Sensitive Robots Agents: A Conceptual ModelPintea, Camelia-M. / Pop, Petrica C. et al. | 2013
- 6
-
Comments on a Cryptosystem Proposed by Wang and HuDurán Díaz, R. / Hernández Encinas, L. / Muñoz Masqué, J. et al. | 2013
- 7
-
Equivalent Inner Key Recovery Attack to NMACLiu, Fanbao / Shen, Changxiang / Xie, Tao et al. | 2013
- 8
-
Hybrid Compression of the Aho-Corasick Automaton for Static Analysis in Intrusion Detection SystemsPungila, Ciprian et al. | 2013
- 9
-
Tracking Traitors in Web Services via Blind SignaturesÁlvarez-Bermejo, J. A. / López-Ramos, J. A. et al. | 2013
- 10
-
C&C Techniques in Botnet DevelopmentBrezo, Félix / de la Puerta, José Gaviria / Santos, Igor / Barroso, David / Bringas, Pablo Garcia et al. | 2013
- 11
-
How Political Illusions Harm National Stability: Fiscal Illusion as a Source of TaxationMourao, Paulo / Cabral, José Pedro et al. | 2013
- 12
-
Software Implementation of Linear Feedback Shift Registers over Extended FieldsDelgado-Mohatar, O. / Fúster-Sabater, A. et al. | 2013
- 13
-
Simulation Analysis of Static and Dynamic Intermediate Nodes and Performance Comparison of MANETS Routing ProtocolsKhan, Jahangir / Bojkovic, Zoran / Hayder, Syed Irfan / Mallah, Gulam Ali / Haseeb, Abdul / Atta, Fariha et al. | 2013
- 14
-
On Fitness Function Based upon Quasigroups Power SequencesOchodková, Eliška / Dvorský, Jiří / Krömer, Pavel / Tuček, Pavel et al. | 2013
- 15
-
Investigation on Operating Systems Identification by Means of Fractal Geometry and OS Pseudorandom Number GeneratorsZelinka, Ivan / Merhaut, Filip / Skanderova, Lenka et al. | 2013
- 16
-
Usability of Software Intrusion-Detection System in Web ApplicationsVala, Radek / Malaník, David / Jašek, Roman et al. | 2013
- 17
-
A Genetic Algorithm for Solving RSA Problem in Elastic Optical Networks with Dedicated Path ProtectionKlinkowski, Mirosław et al. | 2013
- 18
-
Correlation Approach for SQL Injection Attacks DetectionChoraś, Michał / Kozik, Rafał / Puchalski, Damian / Hołubowicz, Witold et al. | 2013
- 19
-
Information Exchange Mechanism between Federated Domains: P2P ApproachChoraś, Michał / Kozik, Rafał / Renk, Rafał / Hołubowicz, Witold et al. | 2013
- 20
-
Web Spam Detection Using MapReduce Approach to Collective ClassificationIndyk, Wojciech / Kajdanowicz, Tomasz / Kazienko, Przemyslaw / Plamowski, Slawomir et al. | 2013
- 21
-
Analysis of Selected Aspects of “IBM I” SecurityPiec, Maciej / Pozniak-Koszalka, Iwona / Koziol, Mariusz et al. | 2013
- 22
-
Metaheuristic Approach for Survivable P2P Multicasting Flow Assignment in Dual Homing NetworksKmiecik, Wojciech / Walkowiak, Krzysztof et al. | 2013
- 23
-
A Tabu Search Algorithm for Optimization of Survivable Overlay Computing SystemsWalkowiak, Krzysztof / Charewicz, Wojciech / Donajski, Maciej / Rak, Jacek et al. | 2013
- 24
-
Greedy Algorithms for Network Anomaly DetectionAndrysiak, Tomasz / Saganowski, Łukasz / Choraś, Michał et al. | 2013
- 25
-
Combined Classifiers with Neural Fuser for Spam DetectionZmyślony, Marcin / Krawczyk, Bartosz / Woźniak, Michał et al. | 2013
- 26
-
Combined Bayesian Classifiers Applied to Spam Filtering ProblemWrótniak, Karol / Woźniak, Michał et al. | 2013
- 27
-
Negobot: A Conversational Agent Based on Game Theory for the Detection of Paedophile BehaviourLaorden, Carlos / Galán-García, Patxi / Santos, Igor / Sanz, Borja / Hidalgo, Jose María Gómez / Bringas, Pablo Garcia et al. | 2013
- 28
-
OPEM: A Static-Dynamic Approach for Machine-Learning-Based Malware DetectionSantos, Igor / Devesa, Jaime / Brezo, Félix / Nieves, Javier / Bringas, Pablo Garcia et al. | 2013
- 29
-
Adult Content Filtering through Compression-Based Text ClassificationSantos, Igor / Galán-García, Patxi / Santamaría-Ibirika, Aitor / Alonso-Isla, Borja / Alabau-Sarasola, Iker / Bringas, Pablo Garcia et al. | 2013
- 30
-
PUMA: Permission Usage to Detect Malware in AndroidSanz, Borja / Santos, Igor / Laorden, Carlos / Ugarte-Pedrero, Xabier / Bringas, Pablo Garcia / Álvarez, Gonzalo et al. | 2013
- 31
-
Application of Soft Computing Technologies toward Assessment and Skills DevelopmentAliaga, Ignacio / Vera, Vicente / Losada, Cristina González / García, Álvaro Enrique / Quintián, Héctor / Corchado, Emilio / Klett, Fanny / García-Hernández, Laura et al. | 2013
- 32
-
An Interactive Mathematica BookÁlvarez-Bermejo, J. A. / Escoriza, J. / López-Ramos, J. A. / Peralta, J. et al. | 2013
- 33
-
Biorefinery Virtual Lab-Integrating E-learning Techniques and Theoretical LearningRedel-Macías, M. D. / Pinzi, S. / Cubero-Atienza, A. J. / Dorado, M. P. / Martínez-Jiménez, M. P. et al. | 2013
- 34
-
Approaching System Administration as a Group Project in Computer Engineering Higher EducationGutiérrez, P. A. / Sánchez-Monedero, J. / Hervás-Martínez, C. / Cruz-Ramírez, M. / Fernández, J. C. / Fernández-Navarro, F. et al. | 2013
- 35
-
Speed Control of A.C. Drive with Induction Motor Using Genetic AlgorithmBrandstetter, Pavel / Dobrovsky, Marek et al. | 2013
- 36
-
Applications of Artificial Neural Networks in Control of DC DriveBrandstetter, Pavel / Bilek, Pavel et al. | 2013
- 37
-
Energy Optimization of a Dynamic System ControllerFedor, Pavol / Perdukova, Daniela et al. | 2013
- 38
-
Optimal Input Vector Based Fuzzy Controller Rules DesignFedor, Pavol / Perdukova, Daniela / Ferkova, Zelmira et al. | 2013
- 39
-
Correlation Methods of OCR Algorithm for Traffic Sign Detection Implementable in MicrocontrollersHercik, Radim / Slaby, Roman / Machacek, Zdenek / Koziorek, Jiri et al. | 2013
- 40
-
Takagi-Sugeno Fuzzy Model in Task of Controllers DesignNowaková, Jana / Pokorný, Miroslav / Pieš, Martin et al. | 2013
- 41
-
Real-Time Estimation of Induction Motor Parameters Based on the Genetic AlgorithmPalacky, Petr / Hudecek, Petr / Havel, Ales et al. | 2013
- 42
-
Comparison of Fuzzy Logic Based and Sliding Mode Based Controller for IM Drive Fed by Matrix ConverterBauer, Jan / Fligl, Stanislav et al. | 2013
- 43
-
Discrete-Time Markov Chains in Reliability Analysis-Case StudySkalny, Pavel / Krajc, Bohumil et al. | 2013
- 44
-
Genetic Algorithm Based Optimization of MGP-FIR Current Reference Generator for Active Power FiltersTalla, Jakub / Peroutka, Zdenek / Ovaska, Seppo J. / Stehlik, Josef et al. | 2013
- 45
-
Correlation-Based Neural Gas for Visualizing Correlations between EEG FeaturesŠtépánová, Karla / Macaš, Martin / Lhotská, Lenka et al. | 2013
- 46
-
Built-in Smartphone Accelerometer Motion Pattern Recognition Using Wavelet TransformJirka, Jakub / Prauzek, Michal et al. | 2013
- 47
-
Temporal Analysis of Remotely Sensed Data for the Assessment of COPD Patients’ Health StatusColantonio, Sara / Salvetti, Ovidio et al. | 2013
- 48
-
Encoding Time Series Data for Better Clustering ResultsBartoň, Tomáš / Kordík, Pavel et al. | 2013
- 49
-
Pattern Recognition in EEG Cognitive Signals Accelerated by GPUDohnálek, Pavel / Gajdoš, Petr / Peterek, Tomáš / Penhaker, Marek et al. | 2013
- 50
-
On the Potential of Fuzzy Rule-Based Ensemble ForecastingSikora, David / Štěpnička, Martin / Vavříčková, Lenka et al. | 2013
- 51
-
Recognition of Damaged Letters Based on Mathematical Fuzzy Logic AnalysisNovak, Vilem / Habiballa, Hashim et al. | 2013
- 52
-
Image Reconstruction with Usage of the F-TransformVlašánek, Pavel / Perfilieva, Irina et al. | 2013
- 53
-
Image Compression with Artificial Neural NetworksKouamo, Stephane / Tangha, Claude et al. | 2013
- 54
-
Image Compression Methodology Based on Fuzzy TransformHurtik, Petr / Perfilieva, Irina et al. | 2013
- 55
-
Implementation of Background Knowledge and Properties Induced by Fuzzy Confirmation Measures in Apriori AlgorithmTomanová, Iva / Kupka, Jiří et al. | 2013