0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,632 Discovery Miles 46 320 Ships in 10 - 15 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R3,993 Discovery Miles 39 930 Ships in 10 - 15 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,670 Discovery Miles 46 700 Ships in 18 - 22 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Modernologies
Cornelia Klinger, Bartomeu Mari, … Paperback R1,231 R1,102 Discovery Miles 11 020
W. E. B. DuBois's Exhibit of American…
Eugene F Provenzo Hardcover R1,471 Discovery Miles 14 710
Miscellaneous Debris
Jerrin Wagstaff Hardcover R869 Discovery Miles 8 690
Visualizing and Exhibiting Jewish Space…
Richard I. Cohen Hardcover R2,237 Discovery Miles 22 370
For My Son - A guided journal for a…
Kai-Nneka S Townsend Hardcover R498 R465 Discovery Miles 4 650
Screensaver - A Judgement-Free Guide To…
Laura Wyatt-Smith Paperback R419 R360 Discovery Miles 3 600
Not Mary Not Roe - The Survival Story of…
Leslie Hope Holthoff Hardcover R459 R431 Discovery Miles 4 310
Korean Youth Transitions - Korean Youth…
Francis Won Hardcover R1,293 Discovery Miles 12 930
Siapa Nama Kamu? Art in Singapore since…
Sara Siew Paperback R240 R222 Discovery Miles 2 220
Vibration of Mindlin Plates…
K.M. Liew, Y. Xiang, … Hardcover R3,317 Discovery Miles 33 170

 

Partners