ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,425 results

Vitamin-V
2024 HiPEAC: Malware detection using opcodes and machine learning

In this video, Martí (UPC) presents part of his work on the detection of malware through the profiling of the dynamic instruction flow ...

1:55
2024 HiPEAC: Malware detection using opcodes and machine learning

73 views

1 year ago

DEFCON Switzerland
Machine Learning For Enhanced Malware Detection & Classification - Solomon Sonya

Solomon Sonya Malware continues to increase in prevalence and sophistication. VirusTotal reported a daily submission of 2M+ ...

47:46
Machine Learning For Enhanced Malware Detection & Classification - Solomon Sonya

1,339 views

1 year ago

BSidesLV
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

Defeating Machine Learning: Systemic Deficiencies for Detecting Malware - Wes Connell, Ryan Peters Ground Truth BSidesLV ...

45:14
Defeating Machine Learning: Systemic Deficiencies for Detecting Malware

2,067 views

9 years ago

NorthSec
Malware Morphology for Detection Engineers

As Defenders it is easy to view attacker behavior through a Technique lens, but this perspective often causes us to forget about ...

2:47:25
Malware Morphology for Detection Engineers

2,559 views

Streamed 2 years ago

OWASP Foundation
Catch me if you can: Building a Web Malware Analyzer using Machine Learning - OWASP AppSecUSA 2014

Recorded at AppSecUSA 2014 in Denver http://2014.appsecusa.org/ Friday, September 19 • 2:00pm - 2:45pm Catch me if you ...

47:38
Catch me if you can: Building a Web Malware Analyzer using Machine Learning - OWASP AppSecUSA 2014

1,030 views

11 years ago

F5, Inc.
Prioritizing Vulnerability Management Using Machine Learning

Cyentia Institute and Kenna Security teamed up to analyze several years of vulnerability data using machine learning to create a ...

3:23
Prioritizing Vulnerability Management Using Machine Learning

1,198 views

5 years ago

SerializingMe
Fumbling Around With Machine Learning and Malware Analysis

Decided to do something somewhat different and play around with machine learning using KNIME and focusing on how one goes ...

1:34:25
Fumbling Around With Machine Learning and Malware Analysis

80 views

6 years ago

CCS 2016
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

Title: FeatureSmith: Automatically Engineering Features for Malware Detection by Mining the Security Literature Authors: Ziyun ...

24:45
CCS 2016 - FeatureSmith: Automatically Engineering Features for Malware Detection

358 views

9 years ago

DEFCONConference
DEF CON 25 - Hyrum Anderson - Evading next gen AV using AI

Much of next-gen AV relies on machine learning to generalize to never-before-seen malware. Less well appreciated, however, ...

18:35
DEF CON 25 - Hyrum Anderson - Evading next gen AV using AI

4,822 views

8 years ago

VideoLecturesChannel
Robust Android Malware Detection Against Adversarial Example Attacks

Authors: Heng Li, Shiyao Zhou, Wei Yuan, Xiapu Luo, Cuiying Gao, Shuiyan Chen.

7:57
Robust Android Malware Detection Against Adversarial Example Attacks

209 views

4 years ago

Canadian Institute for Cybersecurity (CIC)
Application of Deep Learning in Malware Detection and Classification by Samaneh Mahdavifar

A webinar on “Application of Deep Learning in Malware Detection and Classification” by Samaneh Mahdavifar, a Ph.D. student at ...

31:24
Application of Deep Learning in Malware Detection and Classification by Samaneh Mahdavifar

1,075 views

6 years ago

OWASP Foundation
Social Media Botnet Detection with Linkage Analysis and Machine Learning   Rundong Liu

Managed by the OWASP® Foundation https://owasp.org/

28:53
Social Media Botnet Detection with Linkage Analysis and Machine Learning Rundong Liu

414 views

4 years ago

Cooper
DGA-Detect: Using Machine Learning For Collaborative DGA Detection - Tammo Krueger

Stapellauf data appliance ist kein top level domains mit eigenen apps wie filter bis machine learning. Warum dies in level ...

18:13
DGA-Detect: Using Machine Learning For Collaborative DGA Detection - Tammo Krueger

309 views

6 years ago

secappdev.org
Data Mining for Security - Konrad Rieck

Many tasks in computer security revolve around the manual analysis of data, such as the inspection of log files or network traffic.

2:59:54
Data Mining for Security - Konrad Rieck

2,305 views

8 years ago

0xdade
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

Domain generation algorithm (DGA) malware makes callouts to unique web addresses to avoid detection by static rules engines.

46:14
Deep Learning For Realtime Malware Detection - Domenic Puzio and Kate Highnam

5,457 views

7 years ago

PeerJ
Machine learning techniques for imbalanced multiclass malware classification

Read the full PeerJ Computer Science article Machine learning techniques for imbalanced multiclass malware classification ...

5:08
Machine learning techniques for imbalanced multiclass malware classification

48 views

9 months ago

BSides Belfast
Malware Code Similarity Through Vectorsearch - Remco Sprooten

Abstract: In the dynamic field of cybersecurity, novel and efficient methods for malware analysis are paramount. Our research ...

29:11
Malware Code Similarity Through Vectorsearch - Remco Sprooten

137 views

11 months ago

DEFCONConference
DEF CON 23 - John Seymour - Quantum Classification of Malware

Quantum computation has recently become an important area for security research, with its applications to factoring large ...

29:46
DEF CON 23 - John Seymour - Quantum Classification of Malware

1,420 views

10 years ago

Z. Cliffe Schreuders
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

27:21
Reverse Engineering and Malware Analysis: Part 1 Static Analysis

1,329 views

5 years ago

FIRST
Using Yara & Strelka to Identify & Detect Malware

Speakers: Paul Hutelmyer (Target, US), Derek Thomas (Target, US) Adversaries try as much as possible to blend in with behavior ...

1:41:55
Using Yara & Strelka to Identify & Detect Malware

3,400 views

4 years ago