Now showing items 1-2 of 2
Identifying stealth malware using CPU power consumption and learning algorithms
(Journal of Computer Security, 2018)
With the increased assimilation of technology into all aspects of everyday life, rootkits pose a credible threat to individuals, corporations, and governments. Using various techniques, rootkits can infect systems and ...
Detecting Deception Using Machine Learning
(Proceedings of the 54th Hawaii International Conference on System Sciences, 2021-01)
Today’s digital society creates an environment potentially conducive to the exchange of deceptive information. The dissemination of misleading information can have severe consequences on society. This research investigates ...