• Login
    Browsing Institute for Information Security & Privacy (IISP) by Subject 
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Browsing Institute for Information Security & Privacy (IISP) by Subject
    •   SMARTech Home
    • Institute for Information Security & Privacy (IISP)
    • Browsing Institute for Information Security & Privacy (IISP) by Subject
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing Institute for Information Security & Privacy (IISP) by Subject "Machine learning"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-3 of 3

    • title
    • issue date
    • submit date
    • type
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Automated In-memory Malware/rootkit Detection via Binary Analysis and Machine Learning 

        Jones, Malachi (Georgia Institute of Technology, 2018-02-16)
        A prominent technique for detecting sophisticated malware consists of monitoring the execution behavior of each binary to identify anomalies and/or malicious intent. Hooking and emulation are two primary mechanisms that ...
      • Automatic Feature Engineering: Learning to Detect Malware by Mining the Scientific Literature 

        Dumitras, Tudor (Georgia Institute of Technology, 2017-09-29)
        The detection of malware and network attacks increasingly relies on machine learning techniques, which utilize multiple features to separate the malicious and benign behaviors. The effectiveness of these techniques primarily ...
      • Automating the Discovery of Censorship Evasion Strategies 

        Bock, Kevin (Georgia Institute of Technology, 2020-09-11)
        Researchers and censoring regimes have long engaged in a cat-and-mouse game, leading to increasingly sophisticated censorship techniques and methods to evade them. Unfortunately, censors have long had an inherent advantage ...

        Browse

        All of SMARTechCommunities & CollectionsDatesAuthorsTitlesSubjectsTypesThis CommunityDatesAuthorsTitlesSubjectsTypes

        My SMARTech

        Login
        • About
        • Terms of Use
        • Contact Us
        • Emergency Information
        • Legal & Privacy Information
        • Accessibility
        • Accountability
        • Accreditation
        • Employment
        • Login
        Georgia Tech

        © Georgia Institute of Technology

        • About
        • Terms of Use
        • Contact Us
        • Emergency Information
        • Legal & Privacy Information
        • Accessibility
        • Accountability
        • Accreditation
        • Employment
        • Login
        Georgia Tech

        © Georgia Institute of Technology