![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification
Currently, malware is continually evolving and growing in complexity, posing a significant threat to network security. With the constant emergence of new types and quantities of malware coupled with the contin...
-
Chapter and Conference Paper
Research of Snort Rule Extension and APT Detection Based on APT Network Behavior Analysis
At present, APT attack detection has become the focus of the network security protection field. APT attacks are one of the most difficult attacks in cyber attacks. The complexity and variability of APT attack ...
-
Chapter and Conference Paper
Machine Learning for Analyzing Malware
The Internet has become an indispensable part of people’s work and life. It provides favorable communication conditions for malwares. Therefore, malwares are endless and spread faster and become one of the mai...
-
Chapter and Conference Paper
An Approach of Implementing Core Role Based Access Control Model Using Attribute Based Encryption
Cloud Storage, which provides cost-efficient and scalable storage services, has emerged as a hot paradigm today. However, in the resource outsourcing environment such as cloud storage, the resource owner is se...