Author:
Liu Ching-Yuan,Chiu Min-Yi,Huang Qi-Xian,Sun Hung-Min
Publisher
Springer International Publishing
Reference18 articles.
1. SentinelOne: Malicious PDFs - Revealing the Techniques Behind the Attacks. https://www.sentinelone.com/blog/malicious-pdfs-revealing-techniques-behind-attacks/. Accessed 27 Mar 2019
2. Cybersecurity Insiders: Cyber Attack with Ransomware hidden inside PDF Documents. https://www.cybersecurity-insiders.com/cyber-attack-with-ransomware-hidden-inside-pdf-documents/
3. Kaspersky: Top 4 dangerous file attachments. https://www.kaspersky.com/blog/top4-dangerous-attachments-2019/27147/. Accessed 31 May 2019
4. O’Shaughnessy, S.: Image-based malware classification: a space filling curve approach. In: 2019 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–10. IEEE, October 2019. https://doi.org/10.1109/VizSec48167.2019.9161583
5. Nataraj, L., Karthikeyan, S., Jacob, G., Manjunath, B.S.: Malware images: visualization and automatic classification. In: Proceedings of the 8th International Symposium on Visualization for Cyber Security, pp. 1–7, July 2011. https://doi.org/10.1145/2016904.2016908
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The State of Cybersecurity in Digital Landscape to Unmask PDF Malware Attacks;2023 3rd International Conference on Smart Generation Computing, Communication and Networking (SMART GENCON);2023-12-29
2. A Neural Network Approach to a Grayscale Image-Based Multi-File Type Malware Detection System;Applied Sciences;2023-11-30
3. Interpretable PDF Malware Detector;2023 16th International Conference on Security of Information and Networks (SIN);2023-11-20
4. IDERES: Intrusion detection and response system using machine learning and attack graphs;Journal of Systems Architecture;2022-10