Auswahl der wissenschaftlichen Literatur zum Thema „Cuckoo signatures“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Cuckoo signatures" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Cuckoo signatures"

1

Caves, Eleanor M., Martin Stevens, Edwin S. Iversen und Claire N. Spottiswoode. „Hosts of avian brood parasites have evolved egg signatures with elevated information content“. Proceedings of the Royal Society B: Biological Sciences 282, Nr. 1810 (07.07.2015): 20150598. http://dx.doi.org/10.1098/rspb.2015.0598.

Der volle Inhalt der Quelle
Annotation:
Hosts of brood-parasitic birds must distinguish their own eggs from parasitic mimics, or pay the cost of mistakenly raising a foreign chick. Egg discrimination is easier when different host females of the same species each lay visually distinctive eggs (egg ‘signatures’), which helps to foil mimicry by parasites. Here, we ask whether brood parasitism is associated with lower levels of correlation between different egg traits in hosts, making individual host signatures more distinctive and informative. We used entropy as an index of the potential information content encoded by nine aspects of colour, pattern and luminance of eggs of different species in two African bird families (Cisticolidae parasitized by cuckoo finches Anomalospiza imberbis , and Ploceidae by diederik cuckoos Chrysococcyx caprius ). Parasitized species showed consistently higher entropy in egg traits than did related, unparasitized species. Decomposing entropy into two variation components revealed that this was mainly driven by parasitized species having lower levels of correlation between different egg traits, rather than higher overall levels of variation in each individual egg trait. This suggests that irrespective of the constraints that might operate on individual egg traits, hosts can further improve their defensive ‘signatures' by arranging suites of egg traits into unpredictable combinations.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Useche-Peláez, David Esteban, Daniel Orlando Díaz-López, Daniela Sepúlveda-Alzate und Diego Edison Cabuya-Padilla. „Building malware classificators usable by State security agencies“. ITECKNE 15, Nr. 2 (07.12.2018): 107–21. http://dx.doi.org/10.15332/iteckne.v15i2.2072.

Der volle Inhalt der Quelle
Annotation:
Sandboxing has been used regularly to analyze software samples and determine if these contain suspicious properties or behaviors. Even if sandboxing is a powerful technique to perform malware analysis, it requires that a malware analyst performs a rigorous analysis of the results to determine the nature of the sample: goodware or malware. This paper proposes two machine learning models able to classify samples based on signatures and permissions obtained through Cuckoo sandbox, Androguard and VirusTotal. The developed models are also tested obtaining an acceptable percentage of correctly classified samples, being in this way useful tools for a malware analyst. A proposal of architecture for an IoT sentinel that uses one of the developed machine learning model is also showed. Finally, different approaches, perspectives, and challenges about the use of sandboxing and machine learning by security teams in State security agencies are also shared.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Kaur, Harjinder, und Gaganpreet Kaur. „Cuckoo Search based Optimization for Multimodal Biometrics (Signature, Speech and Palmprint)“. International Journal of Computer Applications 107, Nr. 18 (18.12.2014): 28–32. http://dx.doi.org/10.5120/18852-0399.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Rengarajan, A., und M. Mohammed Thaha. „SPCACF: Secured Privacy-Conserving Authentication Scheme using Cuckoo Filter in VANET“. Scalable Computing: Practice and Experience 21, Nr. 1 (19.03.2020): 101–5. http://dx.doi.org/10.12694/scpe.v21i1.1626.

Der volle Inhalt der Quelle
Annotation:
Providing security for vehicular communication is essential since the network is vulnerable to severe attacks.The message authentication between vehicles and pavement units are essential for the purpose of security. Messages that passed between the vehicles should be encrypted and verified before the vehicle nodes could be trusted. The original identity of nodes can only be traceable by authorized parties and should not be exposed at any cause. However authentication between vehicles during message transformation does not guarantees message authentication rate accurately. To address these issues, the SPCACF scheme is proposed which is based on software devoid of relying on any particular hardware. Binary search algorithm is added in partial with Cuckoo Filter to achieve higher accomplishment than the preceding schemes in the batch wise verification phase. In order to guarantee that it can assure message authentication constraint, existential enforceability of underlying signature against adaptively chosen-message attack is proved under the positive filter pool method.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Xie, Gaopeng, Yuling Liu, Guojiang Xin und Qiuwei Yang. „Blockchain-Based Cloud Data Integrity Verification Scheme with High Efficiency“. Security and Communication Networks 2021 (29.04.2021): 1–15. http://dx.doi.org/10.1155/2021/9921209.

Der volle Inhalt der Quelle
Annotation:
With the large-scale application of cloud storage, how to ensure cloud data integrity has become an important issue. Although many methods have been proposed, they still have their limitations. This paper improves some defects of the previous methods and proposes an efficient cloud data integrity verification scheme based on blockchain. In this paper, we proposed a lattice signature algorithm to resist quantum computing and introduced cuckoo filter to simplify the computational overhead of the user verification phase. Finally, the decentralized blockchain network is introduced to replace traditional centralized audit to publicize and authenticate the verification results, which improves the transparency and the security of this scheme. Security analysis shows that our scheme can resist malicious attacks and experimental results show that our scheme has high efficiency, especially in the user verification phase.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Siddiqui, Shadab, Manuj Darbari und Diwakar Yagyasen. „Enhancing the Capability of Load Management Techniques in Cloud Using H_FAC Algorithm Optimization“. International Journal of e-Collaboration 16, Nr. 2 (April 2020): 65–81. http://dx.doi.org/10.4018/ijec.2020040105.

Der volle Inhalt der Quelle
Annotation:
Load balancing is a major research discipline in Cloud computing. The services are provided to users on pay as you go manner. Although a lot of algorithms have been proposed for load balancing, but performance is still an issue. The authors have proposed a new hybrid algorithm H_FAC to optimize the performance in cloud computing. The hybrid technique combines cuckoo search along with the Firefly algorithm of swarm intelligence. The benefit of using hybridization technique is that strength of one algorithm will overcome the shortcomings of other algorithms. Blockchain ID based Signature technique is used to ensure the authenticity of cloud service provider. The experimental results of H_FAC minimize the standard deviation, execution time significantly and improved throughput thereby optimizing the performance. The hybrid algorithm is also compared with other algorithms like ant colony optimization, artificial bee colony, round robin, FCFS and modified throttled. This approach helps the users to get the resources from authentic resource providers with a reduced execution time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

„Predicting the Dynamic Behaviour of Malware using RNN“. International Journal of Engineering and Advanced Technology 9, Nr. 3 (29.02.2020): 3557–59. http://dx.doi.org/10.35940/ijeat.c6291.029320.

Der volle Inhalt der Quelle
Annotation:
Malware analysis can be classified as static and dynamic analysis. Static analysis involves the inspection of the malicious code by observing the features such as file signatures, strings etc. The code obfuscation techniques such as string encryption, class encryption etc can be easily applied on static code analysis. Dynamic or behavioural data is more difficult to obfuscate as the malicious payload may have already been executed before it is detected. In this paper, the dataset is obtained from repositories such as VirusShare and is run in Cuckoo Sandbox with the help of the agent.py. The dynamic features are extracted from the generated Cuckoo logs in the html and JSON format and it has to be determined whether it is malicious or not using recurrent neural networks. Recurrent Neural Networks are capable of predicting whether an executable is malicious and have the ability to capture time-series data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Cuckoo signatures"

1

Sidor, Samuel. „Vylepšený sandboxing pro pokročilé kmeny malwaru“. Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442403.

Der volle Inhalt der Quelle
Annotation:
This Master’s thesis describes reverse engineering with focus on malware analysis. Reader will be informed about theoretical description of static and dynamic analysis. These techniques are later used on analysis of 5 malware families with focus on detection of used anti-sandbox techniques. After that new theoretical improvements are proposed with detection of anti-sandbox techniques or fully avoiding such anti-sandbox evasion techniques. Finally these changes are implemented on main sandbox of Avast Software from which reader can see how effective these improvements are.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie