Automatic analysis of malware behavior using machine learning:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin
Techn. Univ.
2009
|
Schriftenreihe: | Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik / Technische Universität Berlin
Bericht-Nr. 2009-18 |
Schlagworte: | |
Online-Zugang: | kostenfrei |
Beschreibung: | 29 S. graph. Darst. 30 cm |
DOI: | 10.14279/depositonce-10272 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036019127 | ||
003 | DE-604 | ||
005 | 20240228 | ||
007 | t | ||
008 | 100209s2009 d||| |||| 00||| eng d | ||
035 | |a (OCoLC)730266504 | ||
035 | |a (DE-599)BVBBV036019127 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-83 | ||
082 | 0 | |a 004 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Rieck, Konrad |e Verfasser |0 (DE-588)1045255491 |4 aut | |
245 | 1 | 0 | |a Automatic analysis of malware behavior using machine learning |c Konrad Rieck ... |
264 | 1 | |a Berlin |b Techn. Univ. |c 2009 | |
300 | |a 29 S. |b graph. Darst. |c 30 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik / Technische Universität Berlin |v Bericht-Nr. 2009-18 | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Trinius, Philipp |d 1979- |e Verfasser |0 (DE-588)1018109765 |4 aut | |
700 | 1 | |a Willems, Carsten |d 1975- |e Verfasser |0 (DE-588)1013941969 |4 aut | |
700 | 1 | |a Holz, Thorsten |e Verfasser |0 (DE-588)138293430 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |o 10.14279/depositonce-10272 |w (DE-604)BV048451762 |
810 | 2 | |a Technische Universität Berlin |t Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik |v Bericht-Nr. 2009-18 |w (DE-604)BV014139937 |9 2009,18 | |
856 | 4 | 1 | |u https://doi.org/10.14279/depositonce-10272 |x Resolving-System |z kostenfrei |3 Volltext |
912 | |a ebook |
Datensatz im Suchindex
_version_ | 1805072065630306304 |
---|---|
adam_text | |
any_adam_object | |
author | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten |
author_GND | (DE-588)1045255491 (DE-588)1018109765 (DE-588)1013941969 (DE-588)138293430 |
author_facet | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten |
author_role | aut aut aut aut |
author_sort | Rieck, Konrad |
author_variant | k r kr p t pt c w cw t h th |
building | Verbundindex |
bvnumber | BV036019127 |
classification_rvk | ST 277 |
collection | ebook |
ctrlnum | (OCoLC)730266504 (DE-599)BVBBV036019127 |
dewey-full | 004 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004 |
dewey-search | 004 |
dewey-sort | 14 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.14279/depositonce-10272 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036019127</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240228</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100209s2009 d||| |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)730266504</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV036019127</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rieck, Konrad</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1045255491</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic analysis of malware behavior using machine learning</subfield><subfield code="c">Konrad Rieck ...</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Techn. Univ.</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">29 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">30 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik / Technische Universität Berlin</subfield><subfield code="v">Bericht-Nr. 2009-18</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trinius, Philipp</subfield><subfield code="d">1979-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1018109765</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Willems, Carsten</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1013941969</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holz, Thorsten</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)138293430</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="o">10.14279/depositonce-10272</subfield><subfield code="w">(DE-604)BV048451762</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Technische Universität Berlin</subfield><subfield code="t">Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik</subfield><subfield code="v">Bericht-Nr. 2009-18</subfield><subfield code="w">(DE-604)BV014139937</subfield><subfield code="9">2009,18</subfield></datafield><datafield tag="856" ind1="4" ind2="1"><subfield code="u">https://doi.org/10.14279/depositonce-10272</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield></record></collection> |
id | DE-604.BV036019127 |
illustrated | Illustrated |
indexdate | 2024-07-20T04:47:48Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018911290 |
oclc_num | 730266504 |
open_access_boolean | 1 |
owner | DE-83 |
owner_facet | DE-83 |
physical | 29 S. graph. Darst. 30 cm |
psigel | ebook |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Techn. Univ. |
record_format | marc |
series2 | Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik / Technische Universität Berlin |
spelling | Rieck, Konrad Verfasser (DE-588)1045255491 aut Automatic analysis of malware behavior using machine learning Konrad Rieck ... Berlin Techn. Univ. 2009 29 S. graph. Darst. 30 cm txt rdacontent n rdamedia nc rdacarrier Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik / Technische Universität Berlin Bericht-Nr. 2009-18 Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf Malware (DE-588)4687059-3 s Eindringerkennung (DE-588)4706627-1 s DE-604 Trinius, Philipp 1979- Verfasser (DE-588)1018109765 aut Willems, Carsten 1975- Verfasser (DE-588)1013941969 aut Holz, Thorsten Verfasser (DE-588)138293430 aut Erscheint auch als Online-Ausgabe 10.14279/depositonce-10272 (DE-604)BV048451762 Technische Universität Berlin Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik Bericht-Nr. 2009-18 (DE-604)BV014139937 2009,18 https://doi.org/10.14279/depositonce-10272 Resolving-System kostenfrei Volltext |
spellingShingle | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten Automatic analysis of malware behavior using machine learning Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4706627-1 (DE-588)4687059-3 |
title | Automatic analysis of malware behavior using machine learning |
title_auth | Automatic analysis of malware behavior using machine learning |
title_exact_search | Automatic analysis of malware behavior using machine learning |
title_full | Automatic analysis of malware behavior using machine learning Konrad Rieck ... |
title_fullStr | Automatic analysis of malware behavior using machine learning Konrad Rieck ... |
title_full_unstemmed | Automatic analysis of malware behavior using machine learning Konrad Rieck ... |
title_short | Automatic analysis of malware behavior using machine learning |
title_sort | automatic analysis of malware behavior using machine learning |
topic | Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Eindringerkennung Malware |
url | https://doi.org/10.14279/depositonce-10272 |
volume_link | (DE-604)BV014139937 |
work_keys_str_mv | AT rieckkonrad automaticanalysisofmalwarebehaviorusingmachinelearning AT triniusphilipp automaticanalysisofmalwarebehaviorusingmachinelearning AT willemscarsten automaticanalysisofmalwarebehaviorusingmachinelearning AT holzthorsten automaticanalysisofmalwarebehaviorusingmachinelearning |