Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Enhancing cyber-resilience for small and medium-sized organizations with prescriptive malware analysis, detection and response
In this study, the methodology of cyber-resilience in small and medium-sized organizations
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
(SMEs) is investigated, and a comprehensive solution utilizing prescriptive malware …
Triboelectric sensor-empowered intelligent mouse combined with machine learning technology strides toward a computer security system
W Zhang, M Liu, X Lü, L Deng, X Fan, G Cheng… - Nano Energy, 2024 - Elsevier
The computer mouse is one of the most common tools used for human-machine interfacing.
The human behavior studying by click operation using an intelligent mouse and related …
The human behavior studying by click operation using an intelligent mouse and related …
Volmemlyzer: Volatile memory analyzer for malware classification using feature engineering
AH Lashkari, B Li, TL Carrier… - 2021 Reconciling Data …, 2021 - ieeexplore.ieee.org
Memory forensics is a fundamental step that inspects malicious activities during live
malware infection. Memory analysis not only captures malware footprints but also collects …
malware infection. Memory analysis not only captures malware footprints but also collects …
SNDMI: Spyware network traffic detection method based on inducement operations
Spyware is a type of malware widely used by attackers to steal confidential information from
users without their knowledge. It has the characteristics of high latency, high stealth, and …
users without their knowledge. It has the characteristics of high latency, high stealth, and …
Responding to targeted stealthy attacks on android using timely-captured memory dumps
The increasing dominance of Android smartphones for everyday communication and data
processing makes long-term stealthy malware an even more dangerous threat. Recent …
processing makes long-term stealthy malware an even more dangerous threat. Recent …
[HTML][HTML] Module extraction and DLL hijacking detection via single or multiple memory dumps
P Fernández-Álvarez, RJ Rodríguez - Forensic Science International …, 2023 - Elsevier
A memory dump contains the current state of a system's physical memory at the time of its
acquisition. Among other things, it contains the processes that were running at the time of …
acquisition. Among other things, it contains the processes that were running at the time of …
CBFISKD: A combinatorial-based fuzzy inference system for keylogger detection
A keylogger is a type of spyware that records keystrokes from the user's keyboard to steal
confidential information. The problems with most keylogger methods are the lack of …
confidential information. The problems with most keylogger methods are the lack of …
AirKeyLogger: Hardwareless Air-Gap Keylogging Attack
M Guri - 2023 IEEE 47th Annual Computers, Software, and …, 2023 - ieeexplore.ieee.org
This paper presents AirKeyLogger-a novel radio frequency (RF) keylogging attack for air-
gapped computers. Our keylogger exploits radio emissions from a computer's power supply …
gapped computers. Our keylogger exploits radio emissions from a computer's power supply …
[HTML][HTML] Vedrando: A novel way to reveal stealthy attack steps on android through memory forensics
The ubiquity of Android smartphones makes them targets of sophisticated malware, which
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …
maintain long-term stealth, particularly by offloading attack steps to benign apps. Such …
Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …
incident responders. Whereas consequential late detection demands accurate and …