This decommissioned ERA site remains active temporarily to support our final migration steps to https://ualberta.scholaris.ca, ERA's new home. All new collections and items, including Spring 2025 theses, are at that site. For assistance, please contact erahelp@ualberta.ca.
Search
Skip to Search Results- 4malware detection
- 2Remote Access Trojans
- 2industrial control systems
- 2malware
- 1ICS
- 1behavioral analysis
- 4Concordia University of Edmonton
- 3Concordia University of Edmonton/Master of Information Systems Security Management (MISSM) and Master of Information Systems Assurance Management (MISAM) Project Reports (Concordia University of Edmonton)
- 1Concordia University of Edmonton/Student Research Forum (Concordia University of Edmonton)
-
Behavioral-based classification and identification of ransomware variants using machine learning
Download2018
Due to the changing behavior of ransomware, traditional classification and detection techniques do not accurately detect new variants of ransomware. Attackers use polymorphic and metamorphic techniques to avoid detection of signature -based systems. We use machine learning classification to...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2021-04-16
With their role as an integral part of its infrastructure, Industrial Control Systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of Information Systems (IS) into their processes, connecting them to the...
-
Securing remote access networks using malware detection tools for industrial control systems
Download2020
With their role as an integral part of its infrastructure, Industrial control systems (ICS) are a vital part of every nation’s industrial development drive. Like every other facet of life, ICS have witnessed the integration of information systems (IS) into their processes, connecting them to the...
-
2009-01-08
While some percentage of new-born malware has always evaded detection by anti-malware services, the quantity of malware able to compromise preventative controls is increasing. Therefore, enterprise security practitioners must confront the reality that malware will infect their organization's...