Investigating representations of obfuscated malicious PowerShell
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections. === Thesis: M. Eng., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2019 === Cataloged from student-sub...
Main Author: | Holz, Carolyn J. |
---|---|
Other Authors: | Una-May O'Reilly and Erik Hemberg. |
Format: | Others |
Language: | English |
Published: |
Massachusetts Institute of Technology
2019
|
Subjects: | |
Online Access: | https://hdl.handle.net/1721.1/123027 |
Similar Items
Similar Items
-
An Automated De-Obfuscation System for Malicious PowerShell Scripts
by: Meng-Chiao Hsieh, et al.
Published: (2019) -
Monitoring malicious PowerShell usage through log analysis
by: Magnusson, Jesper
Published: (2019) -
Malicious PowerShell Detection Using Attention against Adversarial Attacks
by: Sunoh Choi
Published: (2020-11-01) -
Evaluations of AI‐based malicious PowerShell detection with feature optimizations
by: Jihyeon Song, et al.
Published: (2021-04-01) -
Malicious Powershell Detection Using Graph Convolution Network
by: Sunoh Choi
Published: (2021-07-01)