Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Bogdan, Prelipcean"'
Autor:
Tsakirakis, George, Rodosthenous, Panagiotis, Dragos, Gavrilut, Bogdan, Prelipcean, Ilie, Iulia, Alexopoulos, Andreas, Kalipollitis, Leonidas
This deliverable focuses on the continuous integration towards the realisation of the HEIR framework. The overall architecture of the MVP is described accompanied by a short description of the individual components that were developed and deployed in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3d0bc9237db9e27d3d61a5a63c2a232e
Autor:
Zacharakis, Andreas, Leventis, Christoforos, Koloutsou, Konstantina, Dragos, Gavrilut, Bogdan, Prelipcean, Ilie, Iulia, Alexopoulous, Andreas, Kalipollitis, Leonidas
This deliverable serves as an accompanying report which refers to the release of the MVP of HEIR. The described work emphasizes the development of the envisioned MVP integrated HEIR prototype, ensuring a smooth and effective integration of the compon
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::9dde00309fb99d46a12f3573347719ff
Publikováno v:
SYNASC
The current threat landscape is diverse and has lately been shifting from the binary executable application to a more light-coded and data-oriented approach. Considering this, the use of Microsoft Office documents in attacks has increased. The number
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d1802a749bf18167beb37f4050388cc9
https://zenodo.org/record/3764647
https://zenodo.org/record/3764647
Publikováno v:
SYNASC
The cyber-threat detection problem is a complex one due to the large diversity of attacks, increasing number of prevalent samples and to the arms race between attackers and security researchers. A new class of attacks which appeared in the past years
Publikováno v:
Journal of Computer Virology and Hacking Techniques. 9:171-178
With the exponential growth of malware in the last 5 years, the number of polymorphic malware increased as well. The aim of this paper is to describe the evolution throughout a year of four major malware families (FakeAlert, Sirefef, ZBot and Vundo).
Publikováno v:
SYNASC
As most of the malware nowadays use Internet as their main doorway to infect a new system, it has become imperative for security vendors to provide cloud-based solutions that can filter and block malicious URLs. This paper presents different practica
Publikováno v:
SYNASC
In this paper we propose a noise detection system based on similarities between instances. Having a data set with instances that belongs to multiple classes, a noise instance denotes a wrongly classified record. The similarity between different label
Publikováno v:
SYNASC
In the increasing number of online threats and shape-shifting malware, the use of machine learning techniques has a good impact. To keep the efficiency of these techniques, the training and adaptation schedule must be constant. In this paper we study
Publikováno v:
ICONO '98: Quantum Optics, Interference Phenomena in Atomic Systems, and High-Precision Measurements.
The algorithms developed can be used for any application, which requires tridimensional visualization and additional processing of experimentally acquired images. This paper especially refers to image processing and visualization in laser beam analys
Conference
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.