Implementation of common attack techniques and detection of malicious binaries and executables using machine learning-based detector in Microsoft Windows environment
In digital networks, the most common goal of cybercriminals is to steal high-privilege credentials or valuable data. By obtaining high-privilege credentials, cybercriminals can easily navigate, destroy, or steal an organization's data, such as bank details, personal data, and intellectual prope...
Saved in:
Main Author: | Ladrido, John Martin M. |
---|---|
Format: | text |
Language: | English |
Published: |
Animo Repository
2021
|
Subjects: | |
Online Access: | https://animorepository.dlsu.edu.ph/etdm_ece/10 https://animorepository.dlsu.edu.ph/context/etdm_ece/article/1006/viewcontent/ladrido2.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | De La Salle University |
Language: | English |
Similar Items
-
Cyber pandemic: A rising global threat
by: Lugtu, Reynaldo C., Jr.
Published: (2021) -
Document classification of Filipino online scam incident text using data mining techniques
by: Palad, Eddie Bouy B.
Published: (2018) -
Do students with high grade point averages create better passwords?
by: De La Cuesta, Josephine M.
Published: (2018) -
MLD-AD real-time change password script
by: Inamarga, Harold N.
Published: (2007) -
A visual dictionary attack on Picture Passwords
by: Sadovnik A., et al.
Published: (2018)