Academic literature on the topic 'Detecting backdoor trojans'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Detecting backdoor trojans.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Detecting backdoor trojans"
Tatomur, Irina. "UNIVERSITY CYBER SECURITY AS A METHOD FOR ANTI-FISHING FRAUD." Economic discourse, no. 1 (March 2020): 59–67. http://dx.doi.org/10.36742/2410-0919-2020-1-7.
Full textGao, Hui, Yunfang Chen, and Wei Zhang. "Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification." Security and Communication Networks 2019 (November 29, 2019): 1–12. http://dx.doi.org/10.1155/2019/1953839.
Full textSchofield, Matthew, Gulsum Alicioglu, Bo Sun, et al. "Comparison of Malware Classification Methods using Convolutional Neural Network based on API Call Stream." International Journal of Network Security & Its Applications 13, no. 2 (2021): 1–19. http://dx.doi.org/10.5121/ijnsa.2021.13201.
Full textCatak, Ferhat Ozgur, Ahmet Faruk Yazı, Ogerta Elezaj, and Javed Ahmed. "Deep learning based Sequential model for malware analysis using Windows exe API Calls." PeerJ Computer Science 6 (July 27, 2020): e285. http://dx.doi.org/10.7717/peerj-cs.285.
Full textKulkarni, Ameya, and Chengying Xu. "A Deep Learning Approach in Optical Inspection to Detect Hidden Hardware Trojans and Secure Cybersecurity in Electronics Manufacturing Supply Chains." Frontiers in Mechanical Engineering 7 (July 27, 2021). http://dx.doi.org/10.3389/fmech.2021.709924.
Full text"Detection of Malware attacks in smart phones using Machine Learning." International Journal of Innovative Technology and Exploring Engineering 9, no. 1 (2019): 4396–400. http://dx.doi.org/10.35940/ijitee.a5082.119119.
Full textDissertations / Theses on the topic "Detecting backdoor trojans"
Caravut, Sinchai. "MULTIPLE LOGS ANALYSIS FOR DETECTING ZERO-DAY BACKDOOR TROJANS." Cleveland State University / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=csu1210831685.
Full text(9034049), Miguel Villarreal-Vasquez. "Anomaly Detection and Security Deep Learning Methods Under Adversarial Situation." Thesis, 2020.
Find full textConference papers on the topic "Detecting backdoor trojans"
Zhou, Xinzhe, Wenhao Jiang, Sheng Qi, and Yadong Mu. "Multi-Target Invisibly Trojaned Networks for Visual Recognition and Detection." In Thirtieth International Joint Conference on Artificial Intelligence {IJCAI-21}. International Joint Conferences on Artificial Intelligence Organization, 2021. http://dx.doi.org/10.24963/ijcai.2021/477.
Full textChen, Huili, Cheng Fu, Jishen Zhao, and Farinaz Koushanfar. "DeepInspect: A Black-box Trojan Detection and Mitigation Framework for Deep Neural Networks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/647.
Full textMeade, Travis, Shaojie Zhang, Yier Jin, Zheng Zhao, and David Pan. "Gate-Level Netlist Reverse Engineering Tool Set for Functionality Recovery and Malicious Logic Detection." In ISTFA 2016. ASM International, 2016. http://dx.doi.org/10.31399/asm.cp.istfa2016p0342.
Full text