Academic literature on the topic 'PowerShell'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PowerShell.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "PowerShell"

1

Choi, Sunoh. "Malicious PowerShell Detection Using Attention against Adversarial Attacks." Electronics 9, no. 11 (2020): 1817. http://dx.doi.org/10.3390/electronics9111817.

Full text
Abstract:
Currently, hundreds of thousands of new malicious files are created daily. Existing pattern-based antivirus solutions face difficulties in detecting such files. In addition, malicious PowerShell files are currently being used for fileless attacks. To prevent these problems, artificial intelligence-based detection methods have been suggested. However, methods that use a generative adversarial network (GAN) to avoid AI-based detection have been proposed recently. Attacks that use such methods are called adversarial attacks. In this study, we propose an attention-based filtering method to prevent
APA, Harvard, Vancouver, ISO, and other styles
2

Rose, Anthony J., Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov, and Wayne C. Henry. "ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 153–66. http://dx.doi.org/10.3390/jcp4020008.

Full text
Abstract:
The Antimalware Scan Interface (AMSI) plays a crucial role in detecting malware within Windows operating systems. This paper presents ScriptBlock Smuggling, a novel evasion and log spoofing technique exploiting PowerShell and .NET environments to circumvent the AMSI. By focusing on the manipulation of ScriptBlocks within the Abstract Syntax Tree (AST), this method creates dual AST representations, one for compiler execution and another for antivirus and log analysis, enabling the evasion of AMSI detection and challenging traditional memory patching bypass methods. This research provides a deta
APA, Harvard, Vancouver, ISO, and other styles
3

Wu, Min-Hao, Fu-Hau Hsu, Jian-Hong Hunag, et al. "MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems." Electronics 13, no. 18 (2024): 3717. http://dx.doi.org/10.3390/electronics13183717.

Full text
Abstract:
This manuscript introduces MPSD (Malicious PowerShell Script Detector), an advanced tool to protect Windows systems from malicious PowerShell commands and scripts commonly used in fileless malware attacks. These scripts are often hidden in Office document macros or downloaded remotely via PowerShell, posing significant threats to corporate networks. A 2018 report revealed that 77% of successful cyberattacks involved fileless malware, with PowerShell being the primary attack method, as highlighted in Red Canary’s 2022 report. To counter these threats, MPSD leverages the Antimalware Scan Interfa
APA, Harvard, Vancouver, ISO, and other styles
4

Choi, Sunoh. "Malicious Powershell Detection Using Graph Convolution Network." Applied Sciences 11, no. 14 (2021): 6429. http://dx.doi.org/10.3390/app11146429.

Full text
Abstract:
The internet’s rapid growth has resulted in an increase in the number of malicious files. Recently, powershell scripts and Windows portable executable (PE) files have been used in malicious behaviors. To solve these problems, artificial intelligence (AI) based malware detection methods have been widely studied. Among AI techniques, the graph convolution network (GCN) was recently introduced. Here, we propose a malicious powershell detection method using a GCN. To use the GCN, we needed an adjacency matrix. Therefore, we proposed an adjacency matrix generation method using the Jaccard similarit
APA, Harvard, Vancouver, ISO, and other styles
5

Parag, Bhardwaj. "Driving Operational Efficiency through Azure Automation and PowerShell." International Journal on Science and Technology 12, no. 3 (2021): 1–9. https://doi.org/10.5281/zenodo.14613902.

Full text
Abstract:
In modern times, operational efficiency in enterprises can only be driven by automating workflows, decreasing manual errors and optimizing resource allocation. With PowerShell and Azure Automation, you have a powerful approach to automate repetitive work, maintain your cloud resources, and manage consistent scenarios across environments. Organizations can use the functionality offered by Azure Automation to automate processes like patch management, backup scheduling, virtual machine scaling, and resource provisioning, minimizing the burden of administration for an IT team. This is enhanced by
APA, Harvard, Vancouver, ISO, and other styles
6

Hsiang-Hua Hung, Hsiang-Hua Hung, Jiann-Liang Chen Hsiang-Hua Hung, and Yi-Wei Ma Jiann-Liang Chen. "Machine Learning Approaches to Malicious PowerShell Scripts Detection and Feature Combination Analysis." 網際網路技術學刊 25, no. 1 (2024): 167–73. http://dx.doi.org/10.53106/160792642024012501014.

Full text
Abstract:
<p>With advances in communication technology, modern society relies more than ever on the Internet and various user-friendly digital tools. It provides access to and enables the manipulation of files, trips, and the Windows API. Attackers frequently use various obfuscation techniques PowerShell scripts to avoid detection by anti-virus software. Their doing so can significantly reduce the readability of the script. This work statically analyzes PowerShell scripts. Thirty-three features that were based on the script’s keywords, format, and string combinations were used herein to
APA, Harvard, Vancouver, ISO, and other styles
7

Awang, Hapini, Beh Choon Huat, Athirah Rosli, and Abdulrazak F. Shahatha Al-Mashhadani​. "The Development of a Remote Restart Services System in Production Line Using PowerShell Script." ASM Science Journal 17 (September 26, 2022): 1–7. http://dx.doi.org/10.32802/asmscj.2022.1030.

Full text
Abstract:
The production line is an important part of most manufacturing industries. However, the services in the devices may experience some issues that disrupt the production line, requiring the assistance of an IT technician to resolve the problem. Therefore, this study seeks to bridge the gap through the design and development of a PowerShell Script to allow the user to remote control the services in a device such as computers and servers. Using this program, the production operator can solve the issue immediately rather than wait for an IT technician, thus increasing productivity and performance. T
APA, Harvard, Vancouver, ISO, and other styles
8

Dimov, Radostin, and Zhaneta Savova. "ANTIVIRUS PERFORMANCE EVALUATION AGAINST POWERSHELL OBFUSCATED MALWARE." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 71–78. http://dx.doi.org/10.17770/etr2024vol4.8201.

Full text
Abstract:
In recent years, malware attacks have become increasingly sophisticated, and the methods used by attackers to evade Windows defenses have grown more complex. As a result, detecting and defending against these attacks has become an ever more pressing challenge for security professionals. Despite significant efforts to improve Windows security, attackers continue to find new ways to bypass these defenses and infiltrate systems. The techniques covered in this paper are all currently active and effective at evading Windows defenses. Our findings underscore the need for continued vigilance and the
APA, Harvard, Vancouver, ISO, and other styles
9

Mohapatra, Hitesh. "A Tutorial on PowerShell Pipeline and its Loopholes." International Journal of Emerging Trends in Engineering Research 8, no. 4 (2020): 975–82. http://dx.doi.org/10.30534/ijeter/2020/06842020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Erokhin, Viktor V. "Search for malicious powershell scripts using syntax trees." Bezopasnost informacionnyh tehnology 30, no. 3 (2023): 77–89. http://dx.doi.org/10.26583/bit.2023.3.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "PowerShell"

1

Holz, Carolyn J. "Investigating representations of obfuscated malicious PowerShell." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/123027.

Full text
Abstract:
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.<br>Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019<br>Cataloged from student-submitted PDF version of thesis.<br>Includes bibliographical references (page 54).<br>PowerShell is a popular scripting language due to its widespread use and access to critical system functions. However, these factors also contribute to its popularity amongst malware creators. In addition to the extensi
APA, Harvard, Vancouver, ISO, and other styles
2

Magnusson, Jesper. "Monitoring malicious PowerShell usage through log analysis." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Magnusson, Fredrik. "Implementing a Backup-Scheme with the 3-2-1 Strategy : A Comparison of the Active Solution with a New Implemented 3-2-1 Backup-Scheme." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34347.

Full text
Abstract:
Denna rapport tar upp teorin bakom sannolikhet, backuper och hårddiskar. Baserat på detta implementeras en backup-plan med hjälp av NASar, för att ersätta den redan existerande lösningen. Behovet utav en säkrare, mer tillförlitlig backup, samt expansionsmöjligheter då företaget har en stark tillväxt, lades fram tillsammans med en budget för att ta fram en lösning anpassad utefter det faktiska behovet. Denna plan baseras på teorin i kombination med tredje-parts resultat och har som utgångspunkt den budgeten som erhållits utav företaget, för att slutligen uppnå en hållbar, expanderbar och automa
APA, Harvard, Vancouver, ISO, and other styles
4

Rikardsson, Douglas, and Erik Källqvist. "Svenska organisationers utnyttjande av ny teknik : En studie om svenska kommuners IT-avdelningars syn på ny teknik och deras faktiska handhavande." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45488.

Full text
Abstract:
Stora organisationer anses ofta vara trångsynta vad gäller sin syn på ny teknik och sitt nya sätt att arbeta. De måste ofta genomgå många processer innan beslut kan tas och förändringar kan ske. Om så skulle vara fallet uppstår ett problem i form av att organisationerna inte följer med utvecklingen och därigenom blir kontraproduktiva. Skulle dessa teorier stämma för exempelvis svenska kommuners IT-avdelningar upplyses ett problem som i längden kan drabba oss själva, det vill säga Sveriges medborgare. För att kunna belysa problemet har denna studie använt sig av Windowsverktyget PowerShell för
APA, Harvard, Vancouver, ISO, and other styles
5

Hlaváč, Štěpán. "Virtualizace aplikací v architektuře C/S." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-257073.

Full text
Abstract:
The diploma thesis deals with the possibilities of using application virtualization in the Windows environment. The theoretical part describes the operating principle of application virtualization. Furthermore, there are specified the individual characteristics and the reasons for the move to application virtualization. The author provides the basic overview and comparison of the specific ways of virtualization. The appropriate solution of the practical part was based on the Saaty method. In the practical part, the author describes in detail how to implement and use the chosen technology. Base
APA, Harvard, Vancouver, ISO, and other styles
6

Chmelíček, Jiří. "Návrh systému automatizované správy hardwaru v bankovním prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193884.

Full text
Abstract:
This diploma thesis deals with registration of hardware in the banking environment which is typical of its limitations. The goal of the thesis is to design a system for automated hardware management that complies with all aspects of this environment. The first step to achieve the goal is a selection of development methodology and its adaptation to the nature if the project. The chosen methodology helps to understand and to define the system requirements in terms of future users. According to the requirements there is performed analysis of the market. The result of this analysis confirms the ne
APA, Harvard, Vancouver, ISO, and other styles
7

Барбаш, Є. В. "Розробка автоматизованої системи інвентаризації обладнання". Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23355.

Full text
Abstract:
Барбаш, Є. В. Розробка автоматизованої системи інвентаризації обладнання : випускна кваліфікаційна робота : 123 "Комп’ютерна інженерія" / Є. В. Барбаш ; керівник роботи В. М. Базилевич ; НУ "Чернігівська політехніка", кафедра інформаційних і комп’ютерних систем. – Чернігів, 2020. – 81 с.<br>Об`єктом розробки є спеціалізована система, яка проводить сканування локальної мережі, формує з отриманих значень БД та представляє результати у графічному вигляді. Результатом виконання роботи є реалізація програмної системи, що забезпечує наступні можливості: автоматичне отримання та обробка характеристи
APA, Harvard, Vancouver, ISO, and other styles
8

Мацнєв, І. П., та В. С. Даниленко. "Інформаційна автоматизована система обліку обладнання". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24982.

Full text
Abstract:
Мацнєв, І. П. Інформаційна автоматизована система обліку обладнання : випускна кваліфікаційна робота : 123 "Комп’ютерна інженерія" / І. П. Мацнєв, В. С. Даниленко ; керівник роботи В. М. Базилевич ; НУ "Чернігівська політехніка", кафедра інформаційних і комп’ютерних систем. – Чернігів, 2021. – 79 с.<br>Об`єктом розробки є спеціалізована система, яка проводить сканування локальної мережі, формує з отриманих значень БД та представляє результати у графічному вигляді. Результатом виконання роботи є реалізація програмної системи, що забезпечує наступні можливості: - автоматичне отримання та обробка
APA, Harvard, Vancouver, ISO, and other styles
9

Fonseca, Artur Manuel Conceição. "Plano de marketing PowerShield 2020." Master's thesis, Instituto Superior de Economia e Gestão, 2019. http://hdl.handle.net/10400.5/19575.

Full text
Abstract:
Mestrado em Marketing<br>A indústria da segurança privada, não é por nenhum meio uma das mais entusiasmantes de uma economia. Em Portugal a indústria é mal vista e pouco reconhecida, tanto que há duas empresas que gozam de uma notoriedade tão grande que por vezes os profissionais da indústria são chamados pelo nome de uma das empresas. É um sector onde a esmagadora maioria das empresas são pouco inovadoras, as margens são muito reduzidas e os gestores das empresas são muitas vezes pessoas que saem dos corpos policiais ou militares sem grandes noções de gestão, e as empresas acabam por ser mui
APA, Harvard, Vancouver, ISO, and other styles
10

Jakubis, Tomáš. "Zefektívnenie prenosu elektronickej pošty pomocou pluginu pre Microsoft Exchange." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255327.

Full text
Abstract:
This project discusses optimization of e-mail and SMTP traffic in proprietary product of Microsoft Exchange 2013 in regard of marine industry. The goal is at first to analyze the requirements of this service on slow and unreliable network connections, SMTP traffic and then the product itself. Afterwards it defines specification  for the final product and prepares the test environment. Design and implementation of transport agent using Exchange Management Shell is described for synchronization of two installations of Microsoft Exchange 2013; and focuses on emerged problems during the developmen
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "PowerShell"

1

Kopczynski, Tyson. Windows powershell. Pearson France, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwichtenberg, Holger. Windows PowerShell 4.0. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Holmes, Lee. Windows PowerShell cookbook. O'Reilly, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sukhija, Vikas. PowerShell Fast Track. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7759-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Waters, Ian. PowerShell for Beginners. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7064-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Holmes, Lee. Windows PowerShell cookbook. O'Reilly, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Pete, Handley, and Shaw Marco, eds. Windows PowerShell unleashed. Sams, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Holmes, Lee. Windows PowerShell cookbook. O'Reilly, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Watt, Andrew. Professional Windows PowerShell. John Wiley & Sons, Ltd., 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Holmes, Lee. Windows PowerShell cookbook. 2nd ed. O'Reilly Media, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "PowerShell"

1

Schwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In PowerShell 7 und Windows PowerShell 5 – das Praxisbuch, 5th ed. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446474468.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Schwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell 5.1 und PowerShell Core 6.1. Carl Hanser Verlag GmbH & Co. KG, 2018. http://dx.doi.org/10.3139/9783446459236.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell 5 und PowerShell 7. Carl Hanser Verlag GmbH & Co. KG, 2020. http://dx.doi.org/10.3139/9783446460812.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell und PowerShell Core - Der schnelle Einstieg. Carl Hanser Verlag GmbH & Co. KG, 2018. http://dx.doi.org/10.3139/9783446452817.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Monadjemi, Peter. "PowerShell-Remoting." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Monadjemi, Peter. "PowerShell-Commands." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Monadjemi, Peter. "PowerShell-Skripte." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Carter, Peter A. "PowerShell Fundamentals." In Expert Scripting and Automation for SQL Server DBAs. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1943-0_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cafferky, Bryan. "PowerShell Basics." In Pro PowerShell for Database Developers. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0541-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cafferky, Bryan. "PowerShell Jobs." In Pro PowerShell for Database Developers. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0541-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "PowerShell"

1

Dora, Jean Rosemond, and Ladislav Hluchy. "PowerShell Proxy-Aware Intercommunication and Manipulation." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Vasilevskiy, Pavel A., and Elena V. Bulgakova. "Exploring the Use of Machine Learning to Identify Threats in Powershell Scripts." In 2025 Systems of Signals Generating and Processing in the Field of on Board Communications. IEEE, 2025. https://doi.org/10.1109/ieeeconf64229.2025.10948055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Palumbo, Timothy. "The Power of PowerShell." In SIGUCCS '17: ACM SIGUCCS Annual Conference. ACM, 2017. http://dx.doi.org/10.1145/3123458.3123479.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zavala, Steven, Narasimha Shashidhar, and Cihan Varol. "Cybersecurity Evaluation with PowerShell." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116258.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Sipeng, Zihan Sha, Pu Yu, Wenjuan Bu, and Guovu Huo. "Parent-based Powershell Script Fusion Technology." In 2021 International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2021. http://dx.doi.org/10.1109/isctis51085.2021.00028.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Merzouk Benselloua, Ahmed Yasser, Said Abdesslem Messadi, and Alaa Eddine Belfedhal. "Effective Malicious PowerShell Scripts Detection Using DistilBERT." In 2023 IEEE Afro-Mediterranean Conference on Artificial Intelligence (AMCAI). IEEE, 2023. http://dx.doi.org/10.1109/amcai59331.2023.10431513.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rusak, Gili, Abdullah Al-Dujaili, and Una-May O'Reilly. "AST-Based Deep Learning for Detecting Malicious PowerShell." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3243734.3278496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hendler, Danny, Shay Kels, and Amir Rubin. "Detecting Malicious PowerShell Commands using Deep Neural Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3196494.3196511.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tuličić, D., D. Delija, G. Sirovatka, and M. Mrkoci. "Windows Admin GUI Model for Learning PowerShell Commands." In 2023 46th MIPRO ICT and Electronics Convention (MIPRO). IEEE, 2023. http://dx.doi.org/10.23919/mipro57284.2023.10159862.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Arnold, David, Charlotte David, and Jafar Saniie. "PowerShell Malware Analysis Using a Novel Malware Rating System." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9813771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!