Malware Analysis and Intrusion Detection in Cyber-Physical Systems

Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant r...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via ProQuest)
Main Author: Shiva Darshan, S. L.
Other Authors: Manoj Kumar, M. V., Prashanth, B. S., Vishnu Srinivasa Murthy, Y.
Format: Electronic eBook
Language:English
Published: Hershey : IGI Global, 2023.

MARC

LEADER 00000nam a2200000Mu 4500
001 in00000127990
006 m o d
007 cr |||||||||||
008 231007s2023 xx o ||| 0 eng d
005 20240529224700.1
020 |a 9781668486689 
020 |a 1668486687 
035 |a (OCoLC)ebc1402026548 
035 |a (OCoLC)1402026548 
037 |a ebc30766292 
040 |a EBLCP  |b eng  |c EBLCP 
049 |a GWRE 
050 4 |a QA76.76.C68 .M323 20 
100 1 |a Shiva Darshan, S. L. 
245 1 0 |a Malware Analysis and Intrusion Detection in Cyber-Physical Systems 
260 |a Hershey :  |b IGI Global,  |c 2023. 
300 |a 1 online resource (451 p.) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record. 
505 0 |a Title Page -- Copyright Page -- Book Series -- Table of Contents -- Detailed Table of Contents -- Preface -- Chapter 1: Introduction to the Cyber-Security Landscape -- Chapter 2: Foundation of Malware Analysis and Detection -- Chapter 3: Malware Analysis and Classification -- Chapter 4: Wrapper-Based Feature Selection for Detecting the Lexical Phishing Websites Using Ensemble Learning Algorithms -- Chapter 5: Classification of Firewall Log Files Using Supervised Machine Learning Techniques -- Chapter 6: Discernment and Perusal of Software Vulnerability 
505 8 |a Chapter 7: Knowledge Repository on Cyber Security -- Chapter 8: Impact of Information Leakage and Conserving Digital Privacy -- Chapter 9: Intrusion Detection in Cyber Physical Systems Using Multichain -- Chapter 10: Malware Analysis With Machine Learning -- Chapter 11: Malware Forensics Analysis and Detection in Cyber Physical Systems -- Chapter 12: Malware Analysis and Its Mitigation Tools -- Chapter 13: Malware Forensics -- Chapter 14: Malware Detection Using Yara Rules in SIEM -- Chapter 15: Malware Mitigation Tools -- Chapter 16: The Future of Cyber Security Starts Today, Not Tomorrow 
505 8 |a Compilation of References -- About the Contributors -- Index 
520 |a Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in C. 
700 1 |a Manoj Kumar, M. V. 
700 1 |a Prashanth, B. S. 
700 1 |a Vishnu Srinivasa Murthy, Y. 
776 0 8 |i Print version:  |a Shiva Darshan, S. L.  |t Malware Analysis and Intrusion Detection in Cyber-Physical Systems  |d Hershey : IGI Global,c2023  |z 9781668486665 
856 4 0 |u http://ebookcentral.proquest.com/lib/ucb/detail.action?docID=30766292  |z Full Text (via ProQuest) 
915 |a M 
948 |a May 2024 ebook central cleanup, msw. 
956 |a Ebook Central 
956 |b Ebook Central Perpetual Titles 
994 |a 92  |b COD 
998 |b Added to collection pqebk.perpetual 
999 f f |s d8fcfe07-7760-4f4c-8490-2c2ff0bb7e40  |i 7de3bf2c-6956-4a6e-9d32-25e538ddde79 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.76.C68 .M323 20   |h Library of Congress classification  |i web