Art
J-GLOBAL ID:202002292982968583
Reference number:20A2683942
Encrypted malicious PDF detection method
暗号化された悪性PDFファイルの検知手法
Author (2):
,
Material:
Volume:
2020
Issue:
EIP-90
Page:
Vol.2020-EIP-90,No.20,1-7 (WEB ONLY)
Publication year:
Nov. 18, 2020
JST Material Number:
U0451A
Document type:
Proceedings
Article type:
原著論文
Country of issue:
Japan (JPN)
Language:
JAPANESE (JA)
Thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
,
Semi thesaurus term:
Thesaurus term/Semi thesaurus term
Keywords indexed to the article.
All keywords is available on JDreamIII(charged).
On J-GLOBAL, this item will be available after more than half a year after the record posted. In addtion, medical articles require to login to MyJ-GLOBAL.
,
,
,
,
,
JST classification (2):
JST classification
Category name(code) classified by JST.
Data protection
, Code theory
Reference (19):
-
EMSISOFT: 5 ways to protect yourself against encrypted email attachment malware, available from (https://blog.emsisoft.com/en/31624/5-ways-to-protect-yourself-against-encrypted-email-attachment-malware/) (accessed 2020-09-28).
-
Abrams, L.: CIA Porn Extortion Scams Now Use Password Protected PDFs, available from (https://www.bleepingcomputer.com/news/security/cia-porn-extortion-scams-now-use-passwordprotected-pdfs/) (accessed 2020-09-28).
-
Liu, D., Wang, H. and Stavrou, A.: Detecting Malicious Javascript in PDF through Document Instrumentation, 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 100-111 (2014).
-
大坪雄平,三村守,田中英彦: ファイル構造検査の悪性 PDF ファイル検知への応用,情報処理学会論文誌,Vol. 55, No. 10, pp. 2281-2289 (2014).
-
Pareek, H., Eswari, P. and Babu, N. S. C.: Malicious PDF document detection based on feature extraction and entropy, International Journal Journal of Security, Privacy and Trust Management, Vol. 2, No. 5 (2013).
more...
Terms in the title (4):
Terms in the title
Keywords automatically extracted from the title.
,
,
,
Return to Previous Page