Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Malware = handbook of prevention and...
~
Gritzalis, Dimitris.
Linked to FindBook
Google Book
Amazon
博客來
Malware = handbook of prevention and detection /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Malware/ edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis.
Reminder of title:
handbook of prevention and detection /
other author:
Gritzalis, Dimitris.
Published:
Cham :Springer Nature Switzerland : : 2025.,
Description:
xvii, 410 p. :ill. (chiefly color), digital ;24 cm.
[NT 15003449]:
Part I Theoretical foundation and modeling -- Chapter 1 Classifying Malware using Tensor Decomposition -- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks -- Chapter 3 Mathematical models for malware propagation: state of art and perspectives -- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets -- Part II Machine learning for malware classification -- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting -- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research -- Chapter 7 Conventional Machine Learning-based Android Malware Detectors -- Chapter 8 Conventional Machine Learning-based Android Malware Detectors -- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM -- Part III Social and legal -- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime -- Chapter 11Malware as a Geopolitical Tool -- Part IV Malware analysis in practice and evasions -- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI -- Chapter 13 Unpacking malware in the real world: a step by step guide -- Chapter 14 Forensic Analysis of CapraRAT Android Malware -- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery -- Part V Malware ecosystem -- Chapter 16 The Malware as a Service ecosystem -- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
Contained By:
Springer Nature eBook
Subject:
Malware (Computer software) -
Online resource:
https://doi.org/10.1007/978-3-031-66245-4
ISBN:
9783031662454
Malware = handbook of prevention and detection /
Malware
handbook of prevention and detection /[electronic resource] :edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis. - Cham :Springer Nature Switzerland :2025. - xvii, 410 p. :ill. (chiefly color), digital ;24 cm. - Advances in information security,v. 912512-2193 ;. - Advances in information security ;v. 91..
Part I Theoretical foundation and modeling -- Chapter 1 Classifying Malware using Tensor Decomposition -- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks -- Chapter 3 Mathematical models for malware propagation: state of art and perspectives -- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets -- Part II Machine learning for malware classification -- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting -- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research -- Chapter 7 Conventional Machine Learning-based Android Malware Detectors -- Chapter 8 Conventional Machine Learning-based Android Malware Detectors -- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM -- Part III Social and legal -- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime -- Chapter 11Malware as a Geopolitical Tool -- Part IV Malware analysis in practice and evasions -- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI -- Chapter 13 Unpacking malware in the real world: a step by step guide -- Chapter 14 Forensic Analysis of CapraRAT Android Malware -- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery -- Part V Malware ecosystem -- Chapter 16 The Malware as a Service ecosystem -- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpacking real-world malware and dissecting it to collect and perform a forensic analysis. Similarly, it includes a guide on how to apply state-of-the-art Machine Learning methods to classify malware. Acknowledging that the latter is a serious trend in malware, one part of the book is devoted to providing the reader with the state-of-the-art in Machine Learning methods in malware classification, highlighting the different approaches that are used for, e.g., mobile malware samples and introducing the reader to the challenges that are faced when shifting from a lab to production environment. Modern malware is fueling a worldwide underground economy. The research for this book is backed by theoretical models that simulate how malware propagates and how the spread could be mitigated. The necessary mathematical foundations and probabilistic theoretical models are introduced, and practical results are demonstrated to showcase the efficacy of such models in detecting and countering malware. It presents an outline of the methods that malware authors use to evade detection. This book also provides a thorough overview of the ecosystem, its dynamics and the geopolitical implications are introduced. The latter are complemented by a legal perspective from the African legislative efforts, to allow the reader to understand the human and social impact of malware. This book is designed mainly for researchers and advanced-level computer science students trying to understand the current landscape in malware, as well as applying artificial intelligence and machine learning in malware detection and classification. Professionals who are searching for a perspective to streamline the challenges that arise, when bringing lab solutions into a production environment, and how to timely identify ransomware signals at scale will also want to purchase this book. Beyond data protection experts, who would like to understand how malware siphons private information, experts from law enforcement authorities and the judiciary system, who want to keep up with the recent developments will find this book valuable as well.
ISBN: 9783031662454
Standard No.: 10.1007/978-3-031-66245-4doiSubjects--Topical Terms:
1458432
Malware (Computer software)
LC Class. No.: QA76.76.C68
Dewey Class. No.: 005.8
Malware = handbook of prevention and detection /
LDR
:05044nmm a2200337 a 4500
001
2407752
003
DE-He213
005
20241115120515.0
006
m d
007
cr nn 008maaau
008
260204s2025 sz s 0 eng d
020
$a
9783031662454
$q
(electronic bk.)
020
$a
9783031662447
$q
(paper)
024
7
$a
10.1007/978-3-031-66245-4
$2
doi
035
$a
978-3-031-66245-4
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.76.C68
072
7
$a
URD
$2
bicssc
072
7
$a
COM060040
$2
bisacsh
072
7
$a
URD
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.76.C68
$b
M262 2025
245
0 0
$a
Malware
$h
[electronic resource] :
$b
handbook of prevention and detection /
$c
edited by Dimitris Gritzalis, Kim-Kwang Raymond Choo, Constantinos Patsakis.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2025.
300
$a
xvii, 410 p. :
$b
ill. (chiefly color), digital ;
$c
24 cm.
490
1
$a
Advances in information security,
$x
2512-2193 ;
$v
v. 91
505
0
$a
Part I Theoretical foundation and modeling -- Chapter 1 Classifying Malware using Tensor Decomposition -- Chapter 2 Radial Spike and Slab Bayesian Neural Networks for Sparse Data in Ransomware Attacks -- Chapter 3 Mathematical models for malware propagation: state of art and perspectives -- Chapter 4 Botnet Defense System: A System to Fight Botnets with Botnets -- Part II Machine learning for malware classification -- Chapter 5 Machine Learning-Based Malware Detection in a Production Setting -- Chapter 6 Machine Learning for Windows Malware Detection and Classification: Methods, Challenges and Ongoing Research -- Chapter 7 Conventional Machine Learning-based Android Malware Detectors -- Chapter 8 Conventional Machine Learning-based Android Malware Detectors -- Chapter 9 Method to automate the classification of PE32 malware using Word2vec and LSTM -- Part III Social and legal -- Chapter 10 The South African and Senegalese legislative response to malware facilitated cybercrime -- Chapter 11Malware as a Geopolitical Tool -- Part IV Malware analysis in practice and evasions -- Chapter 12 Advancements in Malware Evasion: Analysis Detection and the Future Role of AI -- Chapter 13 Unpacking malware in the real world: a step by step guide -- Chapter 14 Forensic Analysis of CapraRAT Android Malware -- Chapter 15 Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery -- Part V Malware ecosystem -- Chapter 16 The Malware as a Service ecosystem -- Chapter 17Preventing and detecting malware in smart environments. The smart home case.
520
$a
This book provides a holistic overview of current state of the art and practice in malware research as well as the challenges of malware research from multiple angles. It also provides step-by-step guides in various practical problems, such as unpacking real-world malware and dissecting it to collect and perform a forensic analysis. Similarly, it includes a guide on how to apply state-of-the-art Machine Learning methods to classify malware. Acknowledging that the latter is a serious trend in malware, one part of the book is devoted to providing the reader with the state-of-the-art in Machine Learning methods in malware classification, highlighting the different approaches that are used for, e.g., mobile malware samples and introducing the reader to the challenges that are faced when shifting from a lab to production environment. Modern malware is fueling a worldwide underground economy. The research for this book is backed by theoretical models that simulate how malware propagates and how the spread could be mitigated. The necessary mathematical foundations and probabilistic theoretical models are introduced, and practical results are demonstrated to showcase the efficacy of such models in detecting and countering malware. It presents an outline of the methods that malware authors use to evade detection. This book also provides a thorough overview of the ecosystem, its dynamics and the geopolitical implications are introduced. The latter are complemented by a legal perspective from the African legislative efforts, to allow the reader to understand the human and social impact of malware. This book is designed mainly for researchers and advanced-level computer science students trying to understand the current landscape in malware, as well as applying artificial intelligence and machine learning in malware detection and classification. Professionals who are searching for a perspective to streamline the challenges that arise, when bringing lab solutions into a production environment, and how to timely identify ransomware signals at scale will also want to purchase this book. Beyond data protection experts, who would like to understand how malware siphons private information, experts from law enforcement authorities and the judiciary system, who want to keep up with the recent developments will find this book valuable as well.
650
0
$a
Malware (Computer software)
$3
1458432
650
0
$a
Malware (Computer software)
$x
Prevention
$3
3779780
650
1 4
$a
Privacy.
$3
528582
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Mobile and Network Security.
$3
3382377
700
1
$a
Gritzalis, Dimitris.
$3
1006262
700
1
$a
Choo, Kim-Kwang Raymond.
$3
1001109
700
1
$a
Patsakis, Constantinos.
$3
3779778
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Advances in information security ;
$v
v. 91.
$3
3779779
856
4 0
$u
https://doi.org/10.1007/978-3-031-66245-4
950
$a
Computer Science (SpringerNature-11645)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9513250
電子資源
11.線上閱覽_V
電子書
EB QA76.76.C68
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login