Identifying stealth malware using CPU power consumption and learning algorithms (English)
- New search for: Luckett, Patrick
- New search for: McDonald, J. Todd
- New search for: Glisson, William B.
- New search for: Benton, Ryan
- New search for: Dawson, Joel
- New search for: Doyle, Blair A.
- New search for: Luckett, Patrick
- New search for: McDonald, J. Todd
- New search for: Glisson, William B.
- New search for: Benton, Ryan
- New search for: Dawson, Joel
- New search for: Doyle, Blair A.
In:
Journal of Computer Security
;
26
, 5
;
589-613
;
2018
- Article (Journal) / Electronic Resource
-
Title:Identifying stealth malware using CPU power consumption and learning algorithms
-
Contributors:Luckett, Patrick ( author ) / McDonald, J. Todd ( author ) / Glisson, William B. ( author ) / Benton, Ryan ( author ) / Dawson, Joel ( author ) / Doyle, Blair A. ( author )
-
Published in:Journal of Computer Security ; 26, 5 ; 589-613
-
Publisher:
- New search for: IOS Press
-
Place of publication:Amsterdam, The Netherlands
-
Publication date:2018-07-09
-
Size:25 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 26, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 589
-
Identifying stealth malware using CPU power consumption and learning algorithmsLuckett, Patrick / McDonald, J. Todd / Glisson, William B. / Benton, Ryan / Dawson, Joel / Doyle, Blair A. et al. | 2018
- 615
-
Hybrid adversarial defense: Merging honeypots and traditional security methods1Chakraborty, Tanmoy / Jajodia, Sushil / Park, Noseong / Pugliese, Andrea / Serra, Edoardo / Subrahmanian, V.S. et al. | 2018
- 647
-
k-Skyband query answering with differential privacy1Chen, Ling / Yu, Ting / Chirkova, Rada et al. | 2018
- 677
-
HardIDX: Practical and secure index with SGX in a malicious environmentFuhry, Benny / Bahmani, Raad / Brasser, Ferdinand / Hahn, Florian / Kerschbaum, Florian / Sadeghi, Ahmad-Reza et al. | 2018
- 707
-
Risk-aware multi-objective optimized virtual machine placement in the cloudHan, Jin / Zang, Wangyu / Liu, Li / Chen, Songqing / Yu, Meng et al. | 2018