Cyber Operator: “Security Article Review”
- Trusted Kernel Rootkit Detection for Cybersecurity of VMs Based on Machine Learning and Memory Forensic Analysis*
- Adversarial Malware Detection: Lessons Learned from PDF-based Attacks
- Distributed Denial of Service Attacks – TCP Syn Flooding Attack Mitigation.
- Article Summary: Intelligent OS X malware threat detection with code inspection
- Article Summary: A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning
- Article Summary: Tcp Syn Flood Attack Detection and Prevention System using Adaptive Thresholding Method
- Article Summary: Detecting and Preventing Kernel Rootkit Attacks with Bus Snooping
- Article Summary: A Method for Windows Malware Detection Based on Deep Learning