Property |
Value |
dbo:abstract
|
- L'analyse des logiciels malveillants (« malware » en anglais) permet de déterminer leurs fonctionnements et leurs impacts potentiels. C'est une tâche essentielle dans la sécurité informatique, elle fournit la compréhension nécessaire pour concevoir des contre-mesures efficaces et des stratégies d'atténuation contre les différents logiciels malveillants. (fr)
- L'analyse des logiciels malveillants (« malware » en anglais) permet de déterminer leurs fonctionnements et leurs impacts potentiels. C'est une tâche essentielle dans la sécurité informatique, elle fournit la compréhension nécessaire pour concevoir des contre-mesures efficaces et des stratégies d'atténuation contre les différents logiciels malveillants. (fr)
|
dbo:thumbnail
| |
dbo:wikiPageExternalLink
| |
dbo:wikiPageID
| |
dbo:wikiPageLength
|
- 52907 (xsd:nonNegativeInteger)
|
dbo:wikiPageRevisionID
| |
dbo:wikiPageWikiLink
| |
prop-fr:auteur
|
- Andrew Woodward (fr)
- Aurélien Thierry (fr)
- Craig Valli (fr)
- Fabrice Sabatier (fr)
- Guillaume Bonfante (fr)
- Ioan Cristian Iacob (fr)
- Jean-Yves Marion (fr)
- Matthieu Kaczmarek (fr)
- Murray Brand (fr)
- Andrew Woodward (fr)
- Aurélien Thierry (fr)
- Craig Valli (fr)
- Fabrice Sabatier (fr)
- Guillaume Bonfante (fr)
- Ioan Cristian Iacob (fr)
- Jean-Yves Marion (fr)
- Matthieu Kaczmarek (fr)
- Murray Brand (fr)
|
prop-fr:date
|
- 2007 (xsd:integer)
- 2009 (xsd:integer)
- 2010 (xsd:integer)
- 2012 (xsd:integer)
- 2014 (xsd:integer)
- 2015 (xsd:integer)
- 2016 (xsd:integer)
- 2008-08-01 (xsd:date)
- 2008-11-01 (xsd:date)
- 2011-01-13 (xsd:date)
- 2014-02-20 (xsd:date)
- 2016-10-11 (xsd:date)
- 2017-02-01 (xsd:date)
- April 2015 (fr)
- décembre 2015 (fr)
- mars 2016 (fr)
- April 2016 (fr)
- August 2014 (fr)
- August 2017 (fr)
- December 2007 (fr)
- December 2011 (fr)
- December 2016 (fr)
- July 2010 (fr)
- July 2011 (fr)
- June 2008 (fr)
- June 2017 (fr)
- March 2008 (fr)
- March 2018 (fr)
- May 2009 (fr)
- May 2016 (fr)
- November 2010 (fr)
- November 2012 (fr)
- November 2015 (fr)
- October 2012 (fr)
- September 2011 (fr)
|
prop-fr:doi
|
- 10.100700 (xsd:double)
- 10.101600 (xsd:double)
- 10.105700 (xsd:double)
- 10.110900 (xsd:double)
- 10.114500 (xsd:double)
- 10.117700 (xsd:double)
- 10.184640 (xsd:double)
- 10.423600 (xsd:double)
|
prop-fr:id
|
- Damodaran2017 (fr)
- Deka2016 (fr)
- Egele2008 (fr)
- Gandotra2014 (fr)
- Jilcott2015 (fr)
- Kunwar2016 (fr)
- Moser2007 (fr)
- Rathnayaka2017 (fr)
- Sharif2009 (fr)
- Sun2011 (fr)
- Yakdan2016 (fr)
- Ye2017 (fr)
- You2010 (fr)
- Damodaran2017 (fr)
- Deka2016 (fr)
- Egele2008 (fr)
- Gandotra2014 (fr)
- Jilcott2015 (fr)
- Kunwar2016 (fr)
- Moser2007 (fr)
- Rathnayaka2017 (fr)
- Sharif2009 (fr)
- Sun2011 (fr)
- Yakdan2016 (fr)
- Ye2017 (fr)
- You2010 (fr)
|
prop-fr:isbn
|
- 9781450302029 (xsd:decimal)
- 9781450331531 (xsd:decimal)
- 9781450338325 (xsd:decimal)
- 9781450339629 (xsd:decimal)
- 9781450341394 (xsd:decimal)
- 9781595938862 (xsd:decimal)
- 9781605586373 (xsd:decimal)
- 9781605587806 (xsd:decimal)
|
prop-fr:issn
|
- 360 (xsd:integer)
- 1558 (xsd:integer)
- 1772 (xsd:integer)
- 2153 (xsd:integer)
- 2263 (xsd:integer)
- 2494 (xsd:integer)
|
prop-fr:langue
| |
prop-fr:lireEnLigne
|
- https://hal.inria.fr/hal-00764286%7Cpages=1-9
- http://www.jmeds.eu/index.php/jmeds/article/view/Reverse_Engineering_Malicious_Applications%7Cpages=65-86
- https://doaj.org/article/becddc68e5724ceaa388dd5c3d5f9e41%7Cpages=1-12
- http://doi.acm.org/10.1145/1940941.1940944|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/7527817/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/6061171/|consulté le=2017-11-21 (fr)
- http://ieeexplore.ieee.org/document/6092757/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org:80/document/7514657/?reload=true|consulté le=2018-01-10 (fr)
- http://ieeexplore.ieee.org/document/8029568/|consulté le=2017-11-21 (fr)
- http://doi.acm.org/10.1145/2666652.2666665|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/2089125.2089126|consulté le=2018-01-07 (fr)
- http://ieeexplore.ieee.org/document/7010353/|consulté le=2018-01-10 (fr)
- http://ieeexplore.ieee.org:80/document/6459819/?reload=true|consulté le=2017-11-07 (fr)
- http://www.scirp.org/journal/PaperInformation.aspx?PaperID=44440|consulté le=2018-01-07 (fr)
- http://ieeexplore.ieee.org/document/4413008/|consulté le=2018-01-07 (fr)
- http://ieeexplore.ieee.org/document/6498426/|consulté le=2017-11-07 (fr)
- https://journal.cecyf.fr/ojs/index.php/cybin/article/view/2|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/1314389.1314399|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/7436133/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/7546501/|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/2905055.2905361|consulté le=2018-01-10 (fr)
- http://journals.sagepub.com/doi/10.1177/1548512916670784|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/2976749.2989041|consulté le=2017-11-07 (fr)
- https://link.springer.com/article/10.1007/s11416-015-0261-z|consulté le=2018-01-07 (fr)
- http://ieeexplore.ieee.org/document/5551719/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/6121379/|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/2810103.2813627|consulté le=2017-11-07 (fr)
- http://linkinghub.elsevier.com/retrieve/pii/S016740481730247X|consulté le=2018-01-07 (fr)
- https://link.springer.com/article/10.1007/s11416-007-0074-9|consulté le=2017-11-07 (fr)
- http://journals.sagepub.com/doi/10.1057/ivs.2010.11|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/3073559|consulté le=2018-01-10 (fr)
- https://link.springer.com/article/10.1007/s11416-008-0086-0|consulté le=2018-01-07 (fr)
- http://ieeexplore.ieee.org:80/document/6388211/?reload=true|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/7942517/|consulté le=2018-01-10 (fr)
- http://ieeexplore.ieee.org/document/5633410/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org:80/document/6122815/?reload=true|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/2689702.2689703|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/4630086/|consulté le=2017-11-07 (fr)
- http://doi.acm.org/10.1145/1655148.1655151|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/6410138/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/7225311/|consulté le=2017-11-07 (fr)
- http://ieeexplore.ieee.org/document/5207639/|consulté le=2017-11-07 (fr)
|
prop-fr:nom
|
- Debar (fr)
- Li (fr)
- M (fr)
- Troia (fr)
- Hanna (fr)
- Smith (fr)
- Chen (fr)
- Marion (fr)
- Anderson (fr)
- Ismail (fr)
- Lee (fr)
- White (fr)
- Jacob (fr)
- Austin (fr)
- Bailey (fr)
- Lin (fr)
- Chan (fr)
- Lu (fr)
- Luo (fr)
- Nguyen (fr)
- Sharma (fr)
- Sun (fr)
- Tan (fr)
- Ye (fr)
- Andersen (fr)
- You (fr)
- Fernandez (fr)
- Gao (fr)
- Bonfante (fr)
- Chang (fr)
- Goldman (fr)
- Iyengar (fr)
- Moser (fr)
- Mao (fr)
- Yates (fr)
- Aboughadareh (fr)
- Adjeroh (fr)
- Al-Nemrat (fr)
- Alaeiyan (fr)
- Alazab (fr)
- Azarmi (fr)
- Bansal (fr)
- Bombardieri (fr)
- Bryant (fr)
- Burji (fr)
- Castanò (fr)
- Chuan (fr)
- Csallner (fr)
- Curcio (fr)
- Damodaran (fr)
- Daryabar (fr)
- Dechand (fr)
- Dehghantanha (fr)
- Deka (fr)
- Dudenhofer (fr)
- Dulaunoy (fr)
- Egele (fr)
- Filiol (fr)
- Furfaro (fr)
- Gandotra (fr)
- Gerhards-Padilla (fr)
- Giffin (fr)
- Jadhav (fr)
- Jamdagni (fr)
- Jilcott (fr)
- Kadiri (fr)
- Kang (fr)
- Khoo (fr)
- Kirda (fr)
- Kruegel (fr)
- Kunwar (fr)
- Laih (fr)
- Lanzi (fr)
- Liao (fr)
- Liebrock (fr)
- Lio (fr)
- Liszka (fr)
- Loh (fr)
- McCamant (fr)
- McPhall (fr)
- Mühlberg (fr)
- Nolan (fr)
- Panicker (fr)
- Pao (fr)
- Parsa (fr)
- Poosankam (fr)
- Quist (fr)
- Rathnayaka (fr)
- Rouxel (fr)
- Rupprecht (fr)
- Sarma (fr)
- Scholte (fr)
- Sharif (fr)
- Shudrak (fr)
- Sisco (fr)
- Sofat (fr)
- State (fr)
- Storlie (fr)
- Udzir (fr)
- Venkatraman (fr)
- Vidyarthi (fr)
- Visaggio (fr)
- Wagener (fr)
- Yakdan (fr)
- Yee (fr)
- Yim (fr)
- Yin (fr)
- Zainal (fr)
- Zolotarev (fr)
- Debar (fr)
- Li (fr)
- M (fr)
- Troia (fr)
- Hanna (fr)
- Smith (fr)
- Chen (fr)
- Marion (fr)
- Anderson (fr)
- Ismail (fr)
- Lee (fr)
- White (fr)
- Jacob (fr)
- Austin (fr)
- Bailey (fr)
- Lin (fr)
- Chan (fr)
- Lu (fr)
- Luo (fr)
- Nguyen (fr)
- Sharma (fr)
- Sun (fr)
- Tan (fr)
- Ye (fr)
- Andersen (fr)
- You (fr)
- Fernandez (fr)
- Gao (fr)
- Bonfante (fr)
- Chang (fr)
- Goldman (fr)
- Iyengar (fr)
- Moser (fr)
- Mao (fr)
- Yates (fr)
- Aboughadareh (fr)
- Adjeroh (fr)
- Al-Nemrat (fr)
- Alaeiyan (fr)
- Alazab (fr)
- Azarmi (fr)
- Bansal (fr)
- Bombardieri (fr)
- Bryant (fr)
- Burji (fr)
- Castanò (fr)
- Chuan (fr)
- Csallner (fr)
- Curcio (fr)
- Damodaran (fr)
- Daryabar (fr)
- Dechand (fr)
- Dehghantanha (fr)
- Deka (fr)
- Dudenhofer (fr)
- Dulaunoy (fr)
- Egele (fr)
- Filiol (fr)
- Furfaro (fr)
- Gandotra (fr)
- Gerhards-Padilla (fr)
- Giffin (fr)
- Jadhav (fr)
- Jamdagni (fr)
- Jilcott (fr)
- Kadiri (fr)
- Kang (fr)
- Khoo (fr)
- Kirda (fr)
- Kruegel (fr)
- Kunwar (fr)
- Laih (fr)
- Lanzi (fr)
- Liao (fr)
- Liebrock (fr)
- Lio (fr)
- Liszka (fr)
- Loh (fr)
- McCamant (fr)
- McPhall (fr)
- Mühlberg (fr)
- Nolan (fr)
- Panicker (fr)
- Pao (fr)
- Parsa (fr)
- Poosankam (fr)
- Quist (fr)
- Rathnayaka (fr)
- Rouxel (fr)
- Rupprecht (fr)
- Sarma (fr)
- Scholte (fr)
- Sharif (fr)
- Shudrak (fr)
- Sisco (fr)
- Sofat (fr)
- State (fr)
- Storlie (fr)
- Udzir (fr)
- Venkatraman (fr)
|
prop-fr:numéro
|
- 1 (xsd:integer)
- 2 (xsd:integer)
- 3 (xsd:integer)
- 4 (xsd:integer)
|
prop-fr:pages
|
- 1 (xsd:integer)
- 3 (xsd:integer)
- 6 (xsd:integer)
- 8 (xsd:integer)
- 11 (xsd:integer)
- 13 (xsd:integer)
- 38 (xsd:integer)
- 41 (xsd:integer)
- 46 (xsd:integer)
- 65 (xsd:integer)
- 81 (xsd:integer)
- 94 (xsd:integer)
- 103 (xsd:integer)
- 115 (xsd:integer)
- 117 (xsd:integer)
- 144 (xsd:integer)
- 149 (xsd:integer)
- 158 (xsd:integer)
- 173 (xsd:integer)
- 177 (xsd:integer)
- 245 (xsd:integer)
- 251 (xsd:integer)
- 270 (xsd:integer)
- 279 (xsd:integer)
- 297 (xsd:integer)
- 359 (xsd:integer)
- 421 (xsd:integer)
- 619 (xsd:integer)
- 641 (xsd:integer)
- 720 (xsd:integer)
- 745 (xsd:integer)
- 765 (xsd:integer)
- 912 (xsd:integer)
- 1145 (xsd:integer)
- 1772 (xsd:integer)
|
prop-fr:prénom
|
- Engin (fr)
- Gérard (fr)
- A. (fr)
- E. (fr)
- Eric (fr)
- J. (fr)
- K. (fr)
- M. (fr)
- P. (fr)
- Y. (fr)
- C. (fr)
- W. M. (fr)
- Alexandre (fr)
- Christopher (fr)
- D. (fr)
- Jean-Yves (fr)
- Manuel (fr)
- Xi (fr)
- Hervé (fr)
- N. (fr)
- S. (fr)
- Steve (fr)
- Thomas (fr)
- V. (fr)
- Blake (fr)
- M. A. (fr)
- Stephen (fr)
- Benjamin (fr)
- Donald (fr)
- Jose (fr)
- Mehdi (fr)
- R. A. (fr)
- Radu (fr)
- Sanjeev (fr)
- Tao (fr)
- Thomas H. (fr)
- Xu (fr)
- Z. (fr)
- Aaron (fr)
- C. S. (fr)
- Curtis (fr)
- F. (fr)
- Grégoire (fr)
- Guillaume (fr)
- W. (fr)
- Christoph (fr)
- X. (fr)
- I. (fr)
- James E. (fr)
- M. J. (fr)
- M. K. (fr)
- Adam R (fr)
- Anusha (fr)
- C. C. (fr)
- Chan Lee (fr)
- Chih-Hung (fr)
- Corrado Aaron (fr)
- Cory Q. (fr)
- Daniel A (fr)
- David H. (fr)
- Divya (fr)
- Ekta (fr)
- Fabio Di (fr)
- Hemavathy (fr)
- Heng (fr)
- Hsing-Kuo (fr)
- Jan Tobias (fr)
- Jian-Wei (fr)
- K. J. (fr)
- Lee Ling (fr)
- Lorie M (fr)
- M. H. (fr)
- Micah (fr)
- Min Gyung (fr)
- N. I. (fr)
- N. J. (fr)
- P. K. K. (fr)
- P. P. (fr)
- Patrick P (fr)
- Pongsin (fr)
- Priyanka (fr)
- Rakesh Singh (fr)
- S. Sitharama (fr)
- Shabnam (fr)
- Theodoor (fr)
- Yanfang (fr)
- Z. M. (fr)
- Zachary D (fr)
- Engin (fr)
- Gérard (fr)
- A. (fr)
- E. (fr)
- Eric (fr)
- J. (fr)
- K. (fr)
- M. (fr)
- P. (fr)
- Y. (fr)
- C. (fr)
- W. M. (fr)
- Alexandre (fr)
- Christopher (fr)
- D. (fr)
- Jean-Yves (fr)
- Manuel (fr)
- Xi (fr)
- Hervé (fr)
- N. (fr)
- S. (fr)
- Steve (fr)
- Thomas (fr)
- V. (fr)
- Blake (fr)
- M. A. (fr)
- Stephen (fr)
- Benjamin (fr)
- Donald (fr)
- Jose (fr)
- Mehdi (fr)
- R. A. (fr)
- Radu (fr)
- Sanjeev (fr)
- Tao (fr)
- Thomas H. (fr)
- Xu (fr)
- Z. (fr)
- Aaron (fr)
- C. S. (fr)
- Curtis (fr)
- F. (fr)
- Grégoire (fr)
- Guillaume (fr)
- W. (fr)
- Christoph (fr)
- X. (fr)
- I. (fr)
- James E. (fr)
- M. J. (fr)
- M. K. (fr)
- Adam R (fr)
- Anusha (fr)
- C. C. (fr)
- Chan Lee (fr)
- Chih-Hung (fr)
- Corrado Aaron (fr)
- Cory Q. (fr)
- Daniel A (fr)
- David H. (fr)
- Divya (fr)
- Ekta (fr)
- Fabio Di (fr)
- Hemavathy (fr)
- Heng (fr)
- Hsing-Kuo (fr)
- Jan Tobias (fr)
- Jian-Wei (fr)
- K. J. (fr)
- Lee Ling (fr)
- Lorie M (fr)
- M. H. (fr)
- Micah (fr)
- Min Gyung (fr)
- N. I. (fr)
- N. J. (fr)
- P. K. K. (fr)
- P. P. (fr)
- Patrick P (fr)
- Pongsin (fr)
- Priyanka (fr)
- Rakesh Singh (fr)
- S. Sitharama (fr)
- Shabnam (fr)
- Theodoor (fr)
- Yanfang (fr)
- Z. M. (fr)
- Zachary D (fr)
|
prop-fr:périodique
|
- 7 (xsd:integer)
- 2008 (xsd:integer)
- 2010 (xsd:integer)
- 2011 (xsd:integer)
- 2012 (xsd:integer)
- 2015 (xsd:integer)
- 2016 (xsd:integer)
- 2017 (xsd:integer)
- 20117 (xsd:integer)
- 20152 (xsd:integer)
- 200930 (xsd:integer)
- 201218 (xsd:integer)
- Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies (fr)
- Proceedings of the 4th Program Protection and Reverse Engineering Workshop (fr)
- ACM Comput. Surv. (fr)
- Journal of Digital Forensics, Security and Law, Vol. 5 (fr)
- Computers & Security (fr)
- The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology (fr)
- Information Visualization (fr)
- Journal in Computer Virology (fr)
- Journal of Information Security (fr)
- The Journal on Cybercrime & Digital Investigations (fr)
- Journal of Mobile, Embedded and Distributed Systems, vol. VII, no. 2, 2015 (fr)
- Proceedings of the 2007 ACM Workshop on Recurring Malcode (fr)
- Twenty-Third Annual Computer Security Applications Conference (fr)
- Proceedings of the 1st ACM Workshop on Virtual Machine Security (fr)
- Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security (fr)
- Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (fr)
- Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop (fr)
- Journal of Computer Virology and Hacking Techniques (fr)
- Fifth International Conference on Intelligent Control and Information Processing (fr)
|
prop-fr:série
|
- AISec '14 (fr)
- CCS '15 (fr)
- CCS '16 (fr)
- ICTCS '16 (fr)
- InfoSecCD '10 (fr)
- PPREW-4 (fr)
- VMSec '09 (fr)
- WORM '07 (fr)
- AISec '14 (fr)
- CCS '15 (fr)
- CCS '16 (fr)
- ICTCS '16 (fr)
- InfoSecCD '10 (fr)
- PPREW-4 (fr)
- VMSec '09 (fr)
- WORM '07 (fr)
|
prop-fr:titre
|
- Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware (fr)
- Malicious Code Detection Using Penalized Splines on OPcode Frequency (fr)
- Scalable malware forensics using phylogenetic analysis (fr)
- A static and dynamic visual debugger for malware analysis (fr)
- The New Technique of Decompilation and Its Application in Information Security (fr)
- Automatic Reverse Engineering of Malware Emulators (fr)
- Code synchronization by morphological analysis (fr)
- Emulating Emulation-resistant Malware (fr)
- Evolution of evasive malwares: A survey (fr)
- CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions (fr)
- Honeypot-Powered Malware Reverse Engineering (fr)
- How to Accidentally Stop a Global Cyber Attacks (fr)
- Limits of Static Analysis for Malware Detection (fr)
- Malware Analysis Reverse Engineering Methodology & Malware Defense Timeline (fr)
- Malware Analysis and Classification: A Survey (fr)
- Malware Analysis: Tools and Techniques (fr)
- Malware Obfuscation Techniques: A Brief Survey (fr)
- Malware behaviour analysis (fr)
- Mechanisms of Polymorphic and Metamorphic Viruses (fr)
- Mixed-Mode Malware and Its Analysis (fr)
- An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique (fr)
- Reverse Engineering Malicious Applications (fr)
- Survey on malware anti-analysis (fr)
- Automating Reverse Engineering with Machine Learning Techniques (fr)
- A Survey on Automated Dynamic Malware-analysis Techniques and Tools (fr)
- Reversing Compiled Executables for Malware Analysis via Visualization (fr)
- Behavioral detection of malware: from a survey towards an established taxonomy (fr)
- MCARTA: A Malicious Code Automated Run-Time Analysis framework (fr)
- Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study (fr)
- Modeling information flow for an autonomous agent to support reverse engineering work (fr)
- Malware analysis using reverse engineering and data mining tools (fr)
- Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families (fr)
- Malware detection vectors and analysis techniques: A brief survey (fr)
- Investigation of bypassing malware defences and malware detections (fr)
- A Survey on Malware Detection Using Data Mining Techniques (fr)
- Malware Virtualization-Resistant Behavior Detection (fr)
- A comparison of static, dynamic, and hybrid analysis for malware detection (fr)
- Malware Forensics: Discovery of the Intent of Deception (fr)
- Efficient dynamic malware analysis using virtual time control mechanics (fr)
- Malware Instrumentation Application to Regin Analysis (fr)
- POSTER: Identifying Dynamic Data Structures in Malware (fr)
- Renovo: A Hidden Code Extractor for Packed Executables (fr)
- Automatic loop detection in the sequence of system calls (fr)
- Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware (fr)
- Malicious Code Detection Using Penalized Splines on OPcode Frequency (fr)
- Scalable malware forensics using phylogenetic analysis (fr)
- A static and dynamic visual debugger for malware analysis (fr)
- The New Technique of Decompilation and Its Application in Information Security (fr)
- Automatic Reverse Engineering of Malware Emulators (fr)
- Code synchronization by morphological analysis (fr)
- Emulating Emulation-resistant Malware (fr)
- Evolution of evasive malwares: A survey (fr)
- CoDisasm: Medium Scale Concatic Disassembly of Self-Modifying Binaries with Overlapping Instructions (fr)
- Honeypot-Powered Malware Reverse Engineering (fr)
- How to Accidentally Stop a Global Cyber Attacks (fr)
- Limits of Static Analysis for Malware Detection (fr)
- Malware Analysis Reverse Engineering Methodology & Malware Defense Timeline (fr)
- Malware Analysis and Classification: A Survey (fr)
- Malware Analysis: Tools and Techniques (fr)
- Malware Obfuscation Techniques: A Brief Survey (fr)
- Malware behaviour analysis (fr)
- Mechanisms of Polymorphic and Metamorphic Viruses (fr)
- Mixed-Mode Malware and Its Analysis (fr)
- An Efficient Approach for Advanced Malware Analysis Using Memory Forensic Technique (fr)
- Reverse Engineering Malicious Applications (fr)
- Survey on malware anti-analysis (fr)
- Automating Reverse Engineering with Machine Learning Techniques (fr)
- A Survey on Automated Dynamic Malware-analysis Techniques and Tools (fr)
- Reversing Compiled Executables for Malware Analysis via Visualization (fr)
- Behavioral detection of malware: from a survey towards an established taxonomy (fr)
- MCARTA: A Malicious Code Automated Run-Time Analysis framework (fr)
- Helping Johnny to Analyze Malware: A Usability-Optimized Decompiler and Malware Analysis User Study (fr)
- Modeling information flow for an autonomous agent to support reverse engineering work (fr)
- Malware analysis using reverse engineering and data mining tools (fr)
- Unity in Diversity: Phylogenetic-inspired Techniques for Reverse Engineering and Detection of Malware Families (fr)
- Malware detection vectors and analysis techniques: A brief survey (fr)
- Investigation of bypassing malware defences and malware detections (fr)
- A Survey on Malware Detection Using Data Mining Techniques (fr)
- Malware Virtualization-Resistant Behavior Detection (fr)
- A comparison of static, dynamic, and hybrid analysis for malware detection (fr)
- Malware Forensics: Discovery of the Intent of Deception (fr)
- Efficient dynamic malware analysis using virtual time control mechanics (fr)
- Malware Instrumentation Application to Regin Analysis (fr)
- POSTER: Identifying Dynamic Data Structures in Malware (fr)
- Renovo: A Hidden Code Extractor for Packed Executables (fr)
- Automatic loop detection in the sequence of system calls (fr)
|
prop-fr:url
|
- http://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html|site=malwaretech.com|date=|consulté le= (fr)
- http://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html|site=malwaretech.com|date=|consulté le= (fr)
|
prop-fr:volume
|
- 1 (xsd:integer)
- 4 (xsd:integer)
- 10 (xsd:integer)
- 13 (xsd:integer)
- 14 (xsd:integer)
- 44 (xsd:integer)
- 50 (xsd:integer)
- 73 (xsd:integer)
- 2014 (xsd:integer)
|
prop-fr:wikiPageUsesTemplate
| |
prop-fr:éditeur
| |
dct:subject
| |
rdfs:comment
|
- L'analyse des logiciels malveillants (« malware » en anglais) permet de déterminer leurs fonctionnements et leurs impacts potentiels. C'est une tâche essentielle dans la sécurité informatique, elle fournit la compréhension nécessaire pour concevoir des contre-mesures efficaces et des stratégies d'atténuation contre les différents logiciels malveillants. (fr)
- L'analyse des logiciels malveillants (« malware » en anglais) permet de déterminer leurs fonctionnements et leurs impacts potentiels. C'est une tâche essentielle dans la sécurité informatique, elle fournit la compréhension nécessaire pour concevoir des contre-mesures efficaces et des stratégies d'atténuation contre les différents logiciels malveillants. (fr)
|
rdfs:label
|
- Analyse des logiciels malveillants (fr)
- Análisis de malware (es)
- Malware analysis (en)
- تحليل البرمجيات الخبيثة (ar)
|
owl:sameAs
| |
prov:wasDerivedFrom
| |
foaf:depiction
| |
foaf:isPrimaryTopicOf
| |
is dbo:wikiPageWikiLink
of | |
is oa:hasTarget
of | |
is foaf:primaryTopic
of | |