Login / Signup
Limits of I/O Based Ransomware Detection: An Imitation Based Attack.
Chijin Zhou
Lihua Guo
Yiwei Hou
Zhenya Ma
Quan Zhang
Mingzhe Wang
Zhe Liu
Yu Jiang
Published in:
SP (2023)
Keyphrases
</>
input output
detection method
anomaly detection
attack detection
detection algorithm
main memory
false alarms
normal traffic
database
detection mechanism
detection accuracy
detection rate
object detection
computational models
database management systems
reinforcement learning
malicious users
data mining