0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R2,500 - R5,000 (4)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Hardcover, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R3,993 Discovery Miles 39 930 Ships in 10 - 15 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Cyber Security Intelligence and Analytics - The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA... Cyber Security Intelligence and Analytics - The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 2 (Paperback, 1st ed. 2022)
Zheng Xu, Saed Alrabaee, Octavio Loyola-Gonzalez, Xiaolu Zhang, Niken Dwi Wahyu Cahyani, …
R3,605 Discovery Miles 36 050 Ships in 10 - 15 working days

This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.

Cyber Security Intelligence and Analytics - The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA... Cyber Security Intelligence and Analytics - The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 2 (1st ed. 2023)
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
R5,882 Discovery Miles 58 820 Ships in 18 - 22 working days

This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.

Cyber Security Intelligence and Analytics - The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA... Cyber Security Intelligence and Analytics - The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023), Volume 1 (1st ed. 2023)
Zheng Xu, Saed Alrabaee, Octavio Loyola-González, Niken Dwi Wahyu Cahyani, Nurul Hidayah Ab Rahman
R5,880 Discovery Miles 58 800 Ships in 18 - 22 working days

This book provides the proceedings of the 5th International Conference on Cyber Security Intelligence and Analytics. The 5th International Conference on Cyber Security Intelligence and Analytics (CSIA 2023) is an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary agenda of cyber security, particularly focusing on threat intelligence and analytics and countering cybercrime. Cyber security experts, including those in data analytics, incident response and digital forensics, need to be able to rapidly detect, analyze and defend against a diverse range of cyber threats in near real-time conditions. We are organizing the CSIA 2023 at Radisson Blu Shanghai Pudong Jinqiao Hotel. It will feature a technical program of refereed papers selected by the international program committee, keynote address.

Cyber Security Intelligence and Analytics - The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA... Cyber Security Intelligence and Analytics - The 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), Volume 1 (Paperback, 1st ed. 2022)
Zheng Xu, Saed Alrabaee, Octavio Loyola-Gonzalez, Xiaolu Zhang, Niken Dwi Wahyu Cahyani, …
R4,223 Discovery Miles 42 230 Ships in 18 - 22 working days

This book presents the outcomes of the 2022 4th International Conference on Cyber Security Intelligence and Analytics (CSIA 2022), an international conference dedicated to promoting novel theoretical and applied research advances in the interdisciplinary field of cyber-security, particularly focusing on threat intelligence, analytics, and countering cyber-crime. The conference provides a forum for presenting and discussing innovative ideas, cutting-edge research findings and novel techniques, methods and applications on all aspects of cyber-security intelligence and analytics. Due to COVID-19, authors, keynote speakers and PC committees will attend the conference online.

Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020): Saed... Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting (Paperback, 1st ed. 2020)
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, …
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

This book addresses automated software fingerprinting in binary code, especially for cybersecurity applications. The reader will gain a thorough understanding of binary code analysis and several software fingerprinting techniques for cybersecurity applications, such as malware detection, vulnerability analysis, and digital forensics. More specifically, it starts with an overview of binary code analysis and its challenges, and then discusses the existing state-of-the-art approaches and their cybersecurity applications. Furthermore, it discusses and details a set of practical techniques for compiler provenance extraction, library function identification, function fingerprinting, code reuse detection, free open-source software identification, vulnerability search, and authorship attribution. It also illustrates several case studies to demonstrate the efficiency, scalability and accuracy of the above-mentioned proposed techniques and tools. This book also introduces several innovative quantitative and qualitative techniques that synergistically leverage machine learning, program analysis, and software engineering methods to solve binary code fingerprinting problems, which are highly relevant to cybersecurity and digital forensics applications. The above-mentioned techniques are cautiously designed to gain satisfactory levels of efficiency and accuracy. Researchers working in academia, industry and governmental agencies focusing on Cybersecurity will want to purchase this book. Software engineers and advanced-level students studying computer science, computer engineering and software engineering will also want to purchase this book.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
ZA Key ring - Blue
R199 Discovery Miles 1 990
Poltek 1/100 Poultry Infra Red Lamp…
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990
Sylvanian Families - Walnut Squirrel…
R698 Discovery Miles 6 980
Montale Montale Vanilla Cake Eau De…
R3,100 Discovery Miles 31 000
Avatar 2: The Way Of Water - 4K Ultra HD…
James Cameron Blu-ray disc R622 Discovery Miles 6 220
Democracy Works - Re-Wiring Politics To…
Greg Mills, Olusegun Obasanjo, … Paperback R320 R290 Discovery Miles 2 900
Bond No. 9 Hamptons Eau De Parfum Spray…
R8,260 R5,463 Discovery Miles 54 630
Bamboo Phone & Tablet Docking Stand
R199 R189 Discovery Miles 1 890
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400

 

Partners