Academic literature on the topic 'Malicious behavior pattern'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Malicious behavior pattern.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Malicious behavior pattern"
Seo, Jungwoo, and Sangjin Lee. "Abnormal Behavior Detection to Identify Infected Systems Using the APChain Algorithm and Behavioral Profiling." Security and Communication Networks 2018 (September 4, 2018): 1–24. http://dx.doi.org/10.1155/2018/9706706.
Full textKhan, Abdul Karim, Chris M. Bell, and Samina Quratulain. "The two faces of envy: perceived opportunity to perform as a moderator of envy manifestation." Personnel Review 46, no. 3 (April 3, 2017): 490–511. http://dx.doi.org/10.1108/pr-12-2014-0279.
Full textSong, Chongya, Alexander Pons, and Kang Yen. "AA-HMM: An Anti-Adversarial Hidden Markov Model for Network-Based Intrusion Detection." Applied Sciences 8, no. 12 (November 28, 2018): 2421. http://dx.doi.org/10.3390/app8122421.
Full textDhiyanesh, B., and S. Sakthivel. "UBP-Trust: User Behavioral Pattern Based Secure Trust Model for Mitigating Denial of Service Attacks in Software as a Service (SaaS) Cloud Environment." Journal of Computational and Theoretical Nanoscience 13, no. 10 (October 1, 2016): 7649–54. http://dx.doi.org/10.1166/jctn.2016.5766.
Full textSureda Riera, Tomás, Juan-Ramón Bermejo Higuera, Javier Bermejo Higuera, José-Javier Martínez Herraiz, and Juan-Antonio Sicilia Montalvo. "Prevention and Fighting against Web Attacks through Anomaly Detection Technology. A Systematic Review." Sustainability 12, no. 12 (June 17, 2020): 4945. http://dx.doi.org/10.3390/su12124945.
Full textSoleymani, Ali, and Fatemeh Arabgol. "A Novel Approach for Detecting DGA-Based Botnets in DNS Queries Using Machine Learning Techniques." Journal of Computer Networks and Communications 2021 (July 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/4767388.
Full textHeigl, Michael, Enrico Weigelt, Andreas Urmann, Dalibor Fiala, and Martin Schramm. "Exploiting the Outcome of Outlier Detection for Novel Attack Pattern Recognition on Streaming Data." Electronics 10, no. 17 (September 4, 2021): 2160. http://dx.doi.org/10.3390/electronics10172160.
Full textLange, Jens, Delroy L. Paulhus, and Jan Crusius. "Elucidating the Dark Side of Envy: Distinctive Links of Benign and Malicious Envy With Dark Personalities." Personality and Social Psychology Bulletin 44, no. 4 (December 22, 2017): 601–14. http://dx.doi.org/10.1177/0146167217746340.
Full textSikder, Amit Kumar, Leonardo Babun, and A. Selcuk Uluagac. "A egis +." Digital Threats: Research and Practice 2, no. 1 (March 2021): 1–33. http://dx.doi.org/10.1145/3428026.
Full textYu, WangYang, Chun Gang Yan, ZhiJun Ding, ChangJun Jiang, and MengChu Zhou. "Modeling and Verification of Online Shopping Business Processes by Considering Malicious Behavior Patterns." IEEE Transactions on Automation Science and Engineering 13, no. 2 (April 2016): 647–62. http://dx.doi.org/10.1109/tase.2014.2362819.
Full textDissertations / Theses on the topic "Malicious behavior pattern"
Khan, Saad Usman. "Identification of malicious behavior patterns for software." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-26603.
Full textVarga, Adam. "Identifikace a charakterizace škodlivého chování v grafech chování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442388.
Full textBook chapters on the topic "Malicious behavior pattern"
Mao, Hing-Hao, Chung-Jung Wu, Evangelos E. Papalexakis, Christos Faloutsos, Kuo-Chen Lee, and Tien-Cheu Kao. "MalSpot: Multi2 Malicious Network Behavior Patterns Analysis." In Advances in Knowledge Discovery and Data Mining, 1–14. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-06608-0_1.
Full textGelles, Michael G. "Insider Threat Prevention, Detection, and Mitigation." In International Handbook of Threat Assessment, edited by J. Reid Meloy and Jens Hoffmann, 669–79. Oxford University Press, 2021. http://dx.doi.org/10.1093/med-psych/9780190940164.003.0037.
Full textAridoss, Manimaran. "Defensive Mechanism Against DDoS Attack to Preserve Resource Availability for IoT Applications." In Securing the Internet of Things, 1429–42. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch065.
Full textKhan, Muhammad Imran, Simon N. Foley, and Barry O'Sullivan. "DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations." In Advances in Electronic Government, Digital Divide, and Regional Development, 207–34. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-5984-9.ch010.
Full textJorquera Valero, José María, Manuel Gil Pérez, Alberto Huertas Celdrán, and Gregorio Martínez Pérez. "Identification and Classification of Cyber Threats Through SSH Honeypot Systems." In Handbook of Research on Intrusion Detection Systems, 105–29. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2242-4.ch006.
Full textM., Srikanth Yadav, and Kalpana R. "A Survey on Network Intrusion Detection Using Deep Generative Networks for Cyber-Physical Systems." In Advances in Systems Analysis, Software Engineering, and High Performance Computing, 137–59. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5101-1.ch007.
Full textConference papers on the topic "Malicious behavior pattern"
Choi, Chang, Xuefeng Piao, Junho Choi, Mungyu Lee, and Pankoo Kim. "Malicious behavior pattern mining using control flow graph." In the 2015 Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2811411.2811518.
Full textDemachi, Kazuyuki, and Shi Chen. "Development of Malicious Hand Behaviors Detection Method by Movie Analysis." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81643.
Full textDornhackl, Hermann, Konstantin Kadletz, Robert Luh, and Paul Tavolato. "Malicious Behavior Patterns." In 2014 IEEE 8th International Symposium on Service Oriented System Engineering (SOSE). IEEE, 2014. http://dx.doi.org/10.1109/sose.2014.52.
Full textDalal, Siddhartha, Zihe Wang, and Siddhanth Sabharwal. "Identifying Ransomware Actors in the Bitcoin Network." In 2nd International Conference on Machine Learning, IOT and Blockchain (MLIOB 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111201.
Full textXiaoyan Sun, Ning Guo, and Yuefei Zhu. "Reduction of malicious behavior patterns based on attribute order." In 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010). IEEE, 2010. http://dx.doi.org/10.1109/icicisys.2010.5658544.
Full textPengkui Luo, Ruben Torres, Zhi-Li Zhang, Sabyasachi Saha, Sung-Ju Lee, Antonio Nucci, and Marco Mellia. "Leveraging client-side DNS failure patterns to identify malicious behaviors." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346852.
Full textSilva, Emanuel, and Johannes Lochter. "A study on Anomaly Detection GAN-based methods on image data." In Encontro Nacional de Inteligência Artificial e Computacional. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/eniac.2019.9337.
Full textNimje, Chetan, and Prashil Junghare. "A review on node activity detection, selfish & malicious behavioral patterns using watchdog algorithm." In 2017 International Conference on Inventive Systems and Control (ICISC). IEEE, 2017. http://dx.doi.org/10.1109/icisc.2017.8068663.
Full textChen, Huili, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. "DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. California: International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/647.
Full text