Academic literature on the topic 'PowerShell'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'PowerShell.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "PowerShell"
Choi, Sunoh. "Malicious PowerShell Detection Using Attention against Adversarial Attacks." Electronics 9, no. 11 (2020): 1817. http://dx.doi.org/10.3390/electronics9111817.
Full textRose, Anthony J., Scott R. Graham, Christine M. Schubert Kabban, Jacob J. Krasnov, and Wayne C. Henry. "ScriptBlock Smuggling: Uncovering Stealthy Evasion Techniques in PowerShell and .NET Environments." Journal of Cybersecurity and Privacy 4, no. 2 (2024): 153–66. http://dx.doi.org/10.3390/jcp4020008.
Full textWu, Min-Hao, Fu-Hau Hsu, Jian-Hong Hunag, et al. "MPSD: A Robust Defense Mechanism against Malicious PowerShell Scripts in Windows Systems." Electronics 13, no. 18 (2024): 3717. http://dx.doi.org/10.3390/electronics13183717.
Full textChoi, Sunoh. "Malicious Powershell Detection Using Graph Convolution Network." Applied Sciences 11, no. 14 (2021): 6429. http://dx.doi.org/10.3390/app11146429.
Full textParag, Bhardwaj. "Driving Operational Efficiency through Azure Automation and PowerShell." International Journal on Science and Technology 12, no. 3 (2021): 1–9. https://doi.org/10.5281/zenodo.14613902.
Full textHsiang-Hua Hung, Hsiang-Hua Hung, Jiann-Liang Chen Hsiang-Hua Hung, and Yi-Wei Ma Jiann-Liang Chen. "Machine Learning Approaches to Malicious PowerShell Scripts Detection and Feature Combination Analysis." 網際網路技術學刊 25, no. 1 (2024): 167–73. http://dx.doi.org/10.53106/160792642024012501014.
Full textAwang, Hapini, Beh Choon Huat, Athirah Rosli, and Abdulrazak F. Shahatha Al-Mashhadani. "The Development of a Remote Restart Services System in Production Line Using PowerShell Script." ASM Science Journal 17 (September 26, 2022): 1–7. http://dx.doi.org/10.32802/asmscj.2022.1030.
Full textDimov, Radostin, and Zhaneta Savova. "ANTIVIRUS PERFORMANCE EVALUATION AGAINST POWERSHELL OBFUSCATED MALWARE." ENVIRONMENT. TECHNOLOGIES. RESOURCES. Proceedings of the International Scientific and Practical Conference 4 (June 22, 2024): 71–78. http://dx.doi.org/10.17770/etr2024vol4.8201.
Full textMohapatra, Hitesh. "A Tutorial on PowerShell Pipeline and its Loopholes." International Journal of Emerging Trends in Engineering Research 8, no. 4 (2020): 975–82. http://dx.doi.org/10.30534/ijeter/2020/06842020.
Full textErokhin, Viktor V. "Search for malicious powershell scripts using syntax trees." Bezopasnost informacionnyh tehnology 30, no. 3 (2023): 77–89. http://dx.doi.org/10.26583/bit.2023.3.05.
Full textDissertations / Theses on the topic "PowerShell"
Holz, Carolyn J. "Investigating representations of obfuscated malicious PowerShell." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/123027.
Full textMagnusson, Jesper. "Monitoring malicious PowerShell usage through log analysis." Thesis, Luleå tekniska universitet, Datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-75152.
Full textMagnusson, Fredrik. "Implementing a Backup-Scheme with the 3-2-1 Strategy : A Comparison of the Active Solution with a New Implemented 3-2-1 Backup-Scheme." Thesis, Mittuniversitetet, Avdelningen för informationssystem och -teknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-34347.
Full textRikardsson, Douglas, and Erik Källqvist. "Svenska organisationers utnyttjande av ny teknik : En studie om svenska kommuners IT-avdelningars syn på ny teknik och deras faktiska handhavande." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45488.
Full textHlaváč, Štěpán. "Virtualizace aplikací v architektuře C/S." Master's thesis, Česká zemědělská univerzita v Praze, 2016. http://www.nusl.cz/ntk/nusl-257073.
Full textChmelíček, Jiří. "Návrh systému automatizované správy hardwaru v bankovním prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193884.
Full textБарбаш, Є. В. "Розробка автоматизованої системи інвентаризації обладнання". Thesis, Чернігів, 2020. http://ir.stu.cn.ua/123456789/23355.
Full textМацнєв, І. П., та В. С. Даниленко. "Інформаційна автоматизована система обліку обладнання". Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24982.
Full textFonseca, Artur Manuel Conceição. "Plano de marketing PowerShield 2020." Master's thesis, Instituto Superior de Economia e Gestão, 2019. http://hdl.handle.net/10400.5/19575.
Full textJakubis, Tomáš. "Zefektívnenie prenosu elektronickej pošty pomocou pluginu pre Microsoft Exchange." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255327.
Full textBooks on the topic "PowerShell"
Schwichtenberg, Holger. Windows PowerShell 4.0. Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441200.
Full textSukhija, Vikas. PowerShell Fast Track. Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7759-1.
Full textWaters, Ian. PowerShell for Beginners. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7064-6.
Full textBook chapters on the topic "PowerShell"
Schwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In PowerShell 7 und Windows PowerShell 5 – das Praxisbuch, 5th ed. Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446474468.009.
Full textSchwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell 5.1 und PowerShell Core 6.1. Carl Hanser Verlag GmbH & Co. KG, 2018. http://dx.doi.org/10.3139/9783446459236.009.
Full textSchwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell 5 und PowerShell 7. Carl Hanser Verlag GmbH & Co. KG, 2020. http://dx.doi.org/10.3139/9783446460812.009.
Full textSchwichtenberg, Holger. "Das PowerShell-Navigationsmodell (PowerShell Provider)." In Windows PowerShell und PowerShell Core - Der schnelle Einstieg. Carl Hanser Verlag GmbH & Co. KG, 2018. http://dx.doi.org/10.3139/9783446452817.010.
Full textMonadjemi, Peter. "PowerShell-Remoting." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_13.
Full textMonadjemi, Peter. "PowerShell-Commands." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_4.
Full textMonadjemi, Peter. "PowerShell-Skripte." In X.systems.press. Springer Fachmedien Wiesbaden, 2014. http://dx.doi.org/10.1007/978-3-658-02964-7_9.
Full textCarter, Peter A. "PowerShell Fundamentals." In Expert Scripting and Automation for SQL Server DBAs. Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1943-0_2.
Full textCafferky, Bryan. "PowerShell Basics." In Pro PowerShell for Database Developers. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0541-9_1.
Full textCafferky, Bryan. "PowerShell Jobs." In Pro PowerShell for Database Developers. Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-0541-9_12.
Full textConference papers on the topic "PowerShell"
Dora, Jean Rosemond, and Ladislav Hluchy. "PowerShell Proxy-Aware Intercommunication and Manipulation." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012000.
Full textVasilevskiy, Pavel A., and Elena V. Bulgakova. "Exploring the Use of Machine Learning to Identify Threats in Powershell Scripts." In 2025 Systems of Signals Generating and Processing in the Field of on Board Communications. IEEE, 2025. https://doi.org/10.1109/ieeeconf64229.2025.10948055.
Full textPalumbo, Timothy. "The Power of PowerShell." In SIGUCCS '17: ACM SIGUCCS Annual Conference. ACM, 2017. http://dx.doi.org/10.1145/3123458.3123479.
Full textZavala, Steven, Narasimha Shashidhar, and Cihan Varol. "Cybersecurity Evaluation with PowerShell." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116258.
Full textCheng, Sipeng, Zihan Sha, Pu Yu, Wenjuan Bu, and Guovu Huo. "Parent-based Powershell Script Fusion Technology." In 2021 International Symposium on Computer Technology and Information Science (ISCTIS). IEEE, 2021. http://dx.doi.org/10.1109/isctis51085.2021.00028.
Full textMerzouk Benselloua, Ahmed Yasser, Said Abdesslem Messadi, and Alaa Eddine Belfedhal. "Effective Malicious PowerShell Scripts Detection Using DistilBERT." In 2023 IEEE Afro-Mediterranean Conference on Artificial Intelligence (AMCAI). IEEE, 2023. http://dx.doi.org/10.1109/amcai59331.2023.10431513.
Full textRusak, Gili, Abdullah Al-Dujaili, and Una-May O'Reilly. "AST-Based Deep Learning for Detecting Malicious PowerShell." In CCS '18: 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3243734.3278496.
Full textHendler, Danny, Shay Kels, and Amir Rubin. "Detecting Malicious PowerShell Commands using Deep Neural Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3196494.3196511.
Full textTuličić, D., D. Delija, G. Sirovatka, and M. Mrkoci. "Windows Admin GUI Model for Learning PowerShell Commands." In 2023 46th MIPRO ICT and Electronics Convention (MIPRO). IEEE, 2023. http://dx.doi.org/10.23919/mipro57284.2023.10159862.
Full textArnold, David, Charlotte David, and Jafar Saniie. "PowerShell Malware Analysis Using a Novel Malware Rating System." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9813771.
Full text