A Novel Behavior-Based Solution to Backdoors
碩士 === 國立中央大學 === 資訊工程研究所 === 96 === With the popularity of computers and Internet, more information security problems are taken into consideration. From the old-time virus to the newfashioned worm, Trojan horse and backdoor, nowadays, attackers develop a variety of malware to gain lots of personal...
Main Authors: | Chun-yu Chen, 陳俊佑 |
---|---|
Other Authors: | Fu-hau Hsu |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/01786159035394498579 |
Similar Items
-
On the Rules of Backdoor Listing
by: Kuo-Liang Chen, et al.
Published: (2014) -
The Research of Backdoors for RSA Key Generation
by: Lin, Ting-Yu, et al.
Published: (2006) -
Backdoor Listing in China- Odds of Completion, Choice between Backdoor Listing and IPO, and Post-Backdoor Performance
by: Chin Lin, et al.
Published: (2019) -
Detecting Backdoor
by: Cheng-yuan Kao, et al.
Published: (2004) -
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks
by: Backes, M., et al.
Published: (2022)