<span>This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowled
Cyber Malware : Offensive and Defensive Systems
โ Scribed by Iman Almomani; Leandros A. Maglaras; Mohamed Amine Ferrag; Nick Ayres
- Publisher
- Springer International Publishing
- Year
- 2023
- Tongue
- English
- Leaves
- 310
- Series
- Security Informatics and Law Enforcement
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
โฆ Table of Contents
Cover
Front Matter
1. A Deep-Vision-Based Multi-class Classification System of Android Malware Apps
2. Android Malware Detection Based on Network Analysis and Federated Learning
3. ASParseV3: Auto-Static Parser and Customizable Visualizer
4. Fast-Flux Service Networks: Architecture, Characteristics, and Detection Mechanisms
5. Efficient Graph-Based Malware Detection Using Minimized Kernel and SVM
6. Deep Learning for Windows Malware Analysis
7. Malware Analysis for IoT and Smart AI-Based Applications
8. A Multiclass Classification Approach for IoT Intrusion Detection Based on Feature Selection and Oversampling
9. Malware Mitigation in Cloud Computing Architecture
Back Matter
๐ SIMILAR VOLUMES
Security threats on mobile platforms are one of the key topics and main targets for the next couple of years, given the ubiquity and popularity of these devices, plus their advanced capabilities and use of sensitive application: micro payments, online banking and e-commerce, access to "the cloud", e
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code