0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Hardcover, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,695 Discovery Miles 46 950 Ships in 12 - 17 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R4,044 Discovery Miles 40 440 Ships in 12 - 17 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed.... Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence (Paperback, 1st ed. 2021)
ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb
R4,925 Discovery Miles 49 250 Ships in 10 - 15 working days

The authors develop a malware fingerprinting framework to cover accurate android malware detection and family attribution in this book. The authors emphasize the following: (1) the scalability over a large malware corpus; (2) the resiliency to common obfuscation techniques; (3) the portability over different platforms and architectures. First, the authors propose an approximate fingerprinting technique for android packaging that captures the underlying static structure of the android applications in the context of bulk and offline detection at the app-market level. This book proposes a malware clustering framework to perform malware clustering by building and partitioning the similarity network of malicious applications on top of this fingerprinting technique. Second, the authors propose an approximate fingerprinting technique that leverages dynamic analysis and natural language processing techniques to generate Android malware behavior reports. Based on this fingerprinting technique, the authors propose a portable malware detection framework employing machine learning classification. Third, the authors design an automatic framework to produce intelligence about the underlying malicious cyber-infrastructures of Android malware. The authors then leverage graph analysis techniques to generate relevant intelligence to identify the threat effects of malicious Internet activity associated with android malware. The authors elaborate on an effective android malware detection system, in the online detection context at the mobile device level. It is suitable for deployment on mobile devices, using machine learning classification on method call sequences. Also, it is resilient to common code obfuscation techniques and adaptive to operating systems and malware change overtime, using natural language processing and deep learning techniques. Researchers working in mobile and network security, machine learning and pattern recognition will find this book useful as a reference. Advanced-level students studying computer science within these topic areas will purchase this book as well.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R4,228 Discovery Miles 42 280 Ships in 10 - 15 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Professor Snape Wizard Wand - In…
 (8)
R801 Discovery Miles 8 010
Infantino Animal Counting Book
R170 R159 Discovery Miles 1 590
Home Classix Placemats - Blooming…
R59 R51 Discovery Miles 510
Garmin HRM-Dual Heart Rate Monitor…
R1,499 R1,259 Discovery Miles 12 590
Alcolin Cold Glue (500ml)
R101 Discovery Miles 1 010
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490
Philips TAUE101 Wired In-Ear Headphones…
R199 R129 Discovery Miles 1 290
Man Alone - Mandela's Top Cop, Exposing…
Caryn Dolley Paperback R310 R225 Discovery Miles 2 250
Blood Brothers - To Battleground…
Deon Lamprecht Paperback R290 R195 Discovery Miles 1 950
Marvel Spiderman Fibre-Tip Markers (Pack…
R57 Discovery Miles 570

 

Partners