Automatic analysis of malware behavior using machine learning:
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Berlin
Technische Universität Berlin
[2009]
|
Schriftenreihe: | Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik, Technische Universität Berlin
Bericht-Nr. 2009-18 |
Schlagworte: | |
Online-Zugang: | 11303/11388 kostenfrei https://hdl.handle.net/11303/11388 https://nbn-resolving.org/urn:nbn:de:101:1-2020062402054179587147 https://d-nb.info/1212508920/34 |
Beschreibung: | 1 Online-Ressource (29 Seiten) Diagramme |
DOI: | 10.14279/depositonce-10272 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV048451762 | ||
003 | DE-604 | ||
005 | 20240228 | ||
007 | cr|uuu---uuuuu | ||
008 | 220901s2009 gw |||| o||u| ||||||eng d | ||
015 | |a 20,O07 |2 dnb | ||
016 | 7 | |a 1212508920 |2 DE-101 | |
024 | 7 | |a 10.14279/depositonce-10272 |2 doi | |
024 | 7 | |a urn:nbn:de:101:1-2020062402054179587147 |2 urn | |
035 | |a (OCoLC)1344266574 | ||
035 | |a (DE-599)DNB1212508920 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-83 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a 006.31 |2 sdnb | ||
100 | 1 | |a Rieck, Konrad |e Verfasser |0 (DE-588)1045255491 |4 aut | |
245 | 1 | 0 | |a Automatic analysis of malware behavior using machine learning |c Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz |
264 | 1 | |a Berlin |b Technische Universität Berlin |c [2009] | |
300 | |a 1 Online-Ressource (29 Seiten) |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 1 | |a Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik, Technische Universität Berlin |v Bericht-Nr. 2009-18 | |
583 | 1 | |a Archivierung/Langzeitarchivierung gewährleistet |5 DE-101 |2 pdager | |
650 | 0 | 7 | |a Eindringerkennung |0 (DE-588)4706627-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Malware |0 (DE-588)4687059-3 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4155043-2 |a Forschungsbericht |2 gnd-content | |
689 | 0 | 0 | |a Malware |0 (DE-588)4687059-3 |D s |
689 | 0 | 1 | |a Eindringerkennung |0 (DE-588)4706627-1 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Trinius, Philipp |d 1979- |e Verfasser |0 (DE-588)1018109765 |4 aut | |
700 | 1 | |a Willems, Carsten |d 1975- |e Verfasser |0 (DE-588)1013941969 |4 aut | |
700 | 1 | |a Holz, Thorsten |e Verfasser |0 (DE-588)138293430 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |w (DE-604)BV036019127 |
810 | 2 | |a Technische Universität Berlin, Fakultät Elektrotechnik und Informatik |t Technische Berichte |v 2009,18 |w (DE-604)BV021689926 |9 2009,18 | |
856 | |u 11303/11388 | ||
856 | 4 | 0 | |u https://doi.org/10.14279/depositonce-10272 |x Resolving-System |z kostenfrei |3 Volltext |
856 | 4 | 0 | |u https://hdl.handle.net/11303/11388 |x Resolving-System |
856 | 4 | 0 | |u https://nbn-resolving.org/urn:nbn:de:101:1-2020062402054179587147 |x Resolving-System |
856 | 4 | 0 | |u https://d-nb.info/1212508920/34 |x Langzeitarchivierung Nationalbibliothek |
912 | |a ebook |
Datensatz im Suchindex
_version_ | 1805072065633452032 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten |
author_GND | (DE-588)1045255491 (DE-588)1018109765 (DE-588)1013941969 (DE-588)138293430 |
author_facet | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten |
author_role | aut aut aut aut |
author_sort | Rieck, Konrad |
author_variant | k r kr p t pt c w cw t h th |
building | Verbundindex |
bvnumber | BV048451762 |
classification_rvk | ST 277 |
collection | ebook |
ctrlnum | (OCoLC)1344266574 (DE-599)DNB1212508920 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.14279/depositonce-10272 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 cb4500</leader><controlfield tag="001">BV048451762</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240228</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220901s2009 gw |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">20,O07</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1212508920</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.14279/depositonce-10272</subfield><subfield code="2">doi</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">urn:nbn:de:101:1-2020062402054179587147</subfield><subfield code="2">urn</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1344266574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1212508920</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">006.31</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rieck, Konrad</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1045255491</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automatic analysis of malware behavior using machine learning</subfield><subfield code="c">Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin</subfield><subfield code="b">Technische Universität Berlin</subfield><subfield code="c">[2009]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (29 Seiten)</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik, Technische Universität Berlin</subfield><subfield code="v">Bericht-Nr. 2009-18</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">Archivierung/Langzeitarchivierung gewährleistet</subfield><subfield code="5">DE-101</subfield><subfield code="2">pdager</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4155043-2</subfield><subfield code="a">Forschungsbericht</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Malware</subfield><subfield code="0">(DE-588)4687059-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Eindringerkennung</subfield><subfield code="0">(DE-588)4706627-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Trinius, Philipp</subfield><subfield code="d">1979-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1018109765</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Willems, Carsten</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1013941969</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Holz, Thorsten</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)138293430</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="w">(DE-604)BV036019127</subfield></datafield><datafield tag="810" ind1="2" ind2=" "><subfield code="a">Technische Universität Berlin, Fakultät Elektrotechnik und Informatik</subfield><subfield code="t">Technische Berichte</subfield><subfield code="v">2009,18</subfield><subfield code="w">(DE-604)BV021689926</subfield><subfield code="9">2009,18</subfield></datafield><datafield tag="856" ind1=" " ind2=" "><subfield code="u">11303/11388</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.14279/depositonce-10272</subfield><subfield code="x">Resolving-System</subfield><subfield code="z">kostenfrei</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://hdl.handle.net/11303/11388</subfield><subfield code="x">Resolving-System</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://nbn-resolving.org/urn:nbn:de:101:1-2020062402054179587147</subfield><subfield code="x">Resolving-System</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://d-nb.info/1212508920/34</subfield><subfield code="x">Langzeitarchivierung Nationalbibliothek</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ebook</subfield></datafield></record></collection> |
genre | (DE-588)4155043-2 Forschungsbericht gnd-content |
genre_facet | Forschungsbericht |
id | DE-604.BV048451762 |
illustrated | Not Illustrated |
index_date | 2024-07-03T20:30:58Z |
indexdate | 2024-07-20T04:47:48Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033829903 |
oclc_num | 1344266574 |
open_access_boolean | 1 |
owner | DE-83 |
owner_facet | DE-83 |
physical | 1 Online-Ressource (29 Seiten) Diagramme |
psigel | ebook |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Technische Universität Berlin |
record_format | marc |
series2 | Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik, Technische Universität Berlin |
spelling | Rieck, Konrad Verfasser (DE-588)1045255491 aut Automatic analysis of malware behavior using machine learning Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz Berlin Technische Universität Berlin [2009] 1 Online-Ressource (29 Seiten) Diagramme txt rdacontent c rdamedia cr rdacarrier Forschungsberichte der Fakultät IV - Elektrotechnik und Informatik, Technische Universität Berlin Bericht-Nr. 2009-18 Archivierung/Langzeitarchivierung gewährleistet DE-101 pdager Eindringerkennung (DE-588)4706627-1 gnd rswk-swf Malware (DE-588)4687059-3 gnd rswk-swf (DE-588)4155043-2 Forschungsbericht gnd-content Malware (DE-588)4687059-3 s Eindringerkennung (DE-588)4706627-1 s DE-604 Trinius, Philipp 1979- Verfasser (DE-588)1018109765 aut Willems, Carsten 1975- Verfasser (DE-588)1013941969 aut Holz, Thorsten Verfasser (DE-588)138293430 aut Erscheint auch als Druck-Ausgabe (DE-604)BV036019127 Technische Universität Berlin, Fakultät Elektrotechnik und Informatik Technische Berichte 2009,18 (DE-604)BV021689926 2009,18 11303/11388 https://doi.org/10.14279/depositonce-10272 Resolving-System kostenfrei Volltext https://hdl.handle.net/11303/11388 Resolving-System https://nbn-resolving.org/urn:nbn:de:101:1-2020062402054179587147 Resolving-System https://d-nb.info/1212508920/34 Langzeitarchivierung Nationalbibliothek |
spellingShingle | Rieck, Konrad Trinius, Philipp 1979- Willems, Carsten 1975- Holz, Thorsten Automatic analysis of malware behavior using machine learning Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
subject_GND | (DE-588)4706627-1 (DE-588)4687059-3 (DE-588)4155043-2 |
title | Automatic analysis of malware behavior using machine learning |
title_auth | Automatic analysis of malware behavior using machine learning |
title_exact_search | Automatic analysis of malware behavior using machine learning |
title_exact_search_txtP | Automatic analysis of malware behavior using machine learning |
title_full | Automatic analysis of malware behavior using machine learning Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz |
title_fullStr | Automatic analysis of malware behavior using machine learning Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz |
title_full_unstemmed | Automatic analysis of malware behavior using machine learning Konrad Rieck, Philipp Trinius, Carsten Willems, and Thorsten Holz |
title_short | Automatic analysis of malware behavior using machine learning |
title_sort | automatic analysis of malware behavior using machine learning |
topic | Eindringerkennung (DE-588)4706627-1 gnd Malware (DE-588)4687059-3 gnd |
topic_facet | Eindringerkennung Malware Forschungsbericht |
url | 11303/11388 https://doi.org/10.14279/depositonce-10272 https://hdl.handle.net/11303/11388 https://nbn-resolving.org/urn:nbn:de:101:1-2020062402054179587147 https://d-nb.info/1212508920/34 |
volume_link | (DE-604)BV021689926 |
work_keys_str_mv | AT rieckkonrad automaticanalysisofmalwarebehaviorusingmachinelearning AT triniusphilipp automaticanalysisofmalwarebehaviorusingmachinelearning AT willemscarsten automaticanalysisofmalwarebehaviorusingmachinelearning AT holzthorsten automaticanalysisofmalwarebehaviorusingmachinelearning |