Malware Analysis and Intrusion Detection in Cyber-Physical Systems
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...
Saved in:
Online Access: |
Full Text (via ProQuest) |
---|---|
Main Author: | |
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Hershey :
IGI Global,
2023.
|
MARC
LEADER | 00000nam a2200000Mu 4500 | ||
---|---|---|---|
001 | in00000127990 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 231007s2023 xx o ||| 0 eng d | ||
005 | 20240529224700.1 | ||
020 | |a 9781668486689 | ||
020 | |a 1668486687 | ||
035 | |a (OCoLC)ebc1402026548 | ||
035 | |a (OCoLC)1402026548 | ||
037 | |a ebc30766292 | ||
040 | |a EBLCP |b eng |c EBLCP | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.76.C68 .M323 20 | |
100 | 1 | |a Shiva Darshan, S. L. | |
245 | 1 | 0 | |a Malware Analysis and Intrusion Detection in Cyber-Physical Systems |
260 | |a Hershey : |b IGI Global, |c 2023. | ||
300 | |a 1 online resource (451 p.) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Title Page -- Copyright Page -- Book Series -- Table of Contents -- Detailed Table of Contents -- Preface -- Chapter 1: Introduction to the Cyber-Security Landscape -- Chapter 2: Foundation of Malware Analysis and Detection -- Chapter 3: Malware Analysis and Classification -- Chapter 4: Wrapper-Based Feature Selection for Detecting the Lexical Phishing Websites Using Ensemble Learning Algorithms -- Chapter 5: Classification of Firewall Log Files Using Supervised Machine Learning Techniques -- Chapter 6: Discernment and Perusal of Software Vulnerability | |
505 | 8 | |a Chapter 7: Knowledge Repository on Cyber Security -- Chapter 8: Impact of Information Leakage and Conserving Digital Privacy -- Chapter 9: Intrusion Detection in Cyber Physical Systems Using Multichain -- Chapter 10: Malware Analysis With Machine Learning -- Chapter 11: Malware Forensics Analysis and Detection in Cyber Physical Systems -- Chapter 12: Malware Analysis and Its Mitigation Tools -- Chapter 13: Malware Forensics -- Chapter 14: Malware Detection Using Yara Rules in SIEM -- Chapter 15: Malware Mitigation Tools -- Chapter 16: The Future of Cyber Security Starts Today, Not Tomorrow | |
505 | 8 | |a Compilation of References -- About the Contributors -- Index | |
520 | |a Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in C. | ||
700 | 1 | |a Manoj Kumar, M. V. | |
700 | 1 | |a Prashanth, B. S. | |
700 | 1 | |a Vishnu Srinivasa Murthy, Y. | |
776 | 0 | 8 | |i Print version: |a Shiva Darshan, S. L. |t Malware Analysis and Intrusion Detection in Cyber-Physical Systems |d Hershey : IGI Global,c2023 |z 9781668486665 |
856 | 4 | 0 | |u http://ebookcentral.proquest.com/lib/ucb/detail.action?docID=30766292 |z Full Text (via ProQuest) |
915 | |a M | ||
948 | |a May 2024 ebook central cleanup, msw. | ||
956 | |a Ebook Central | ||
956 | |b Ebook Central Perpetual Titles | ||
994 | |a 92 |b COD | ||
998 | |b Added to collection pqebk.perpetual | ||
999 | f | f | |s d8fcfe07-7760-4f4c-8490-2c2ff0bb7e40 |i 7de3bf2c-6956-4a6e-9d32-25e538ddde79 |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.76.C68 .M323 20 |h Library of Congress classification |i web |