|
|
Bimonthly Since 1986 |
ISSN 1004-9037
|
|
|
|
|
Publication Details |
Edited by: Editorial Board of Journal of Data Acquisition and Processing
P.O. Box 2704, Beijing 100190, P.R. China
Sponsored by: Institute of Computing Technology, CAS & China Computer Federation
Undertaken by: Institute of Computing Technology, CAS
Published by: SCIENCE PRESS, BEIJING, CHINA
Distributed by:
China: All Local Post Offices
|
|
|
|
|
|
|
|
|
|
|
05 September 2023, Volume 38 Issue 3
|
|
|
Abstract
With the increasing sophistication and frequency of cyber threats, cybersecurity and reverse engineering have become critical areas of research. The advent of big data and machine learning techniques has provided new opportunities to enhance security measures and counter malicious activities. This research article presents a comprehensive analysis of databases and machine learning methods employed in the domains of cybersecurity and reverse engineering. We examine various databases used for storing and managing security-related data, including threat intelligence, malware samples, and network traffic logs. Additionally, we explore the application of machine learning algorithms for anomaly detection, intrusion detection, malware analysis, and vulnerability assessment. The study evaluates the strengths, limitations, and challenges associated with different databases and machine learning techniques, along with their implications for effective cybersecurity and reverse engineering practices. Furthermore, we highlight potential future research directions in this field.
Keyword
cybersecurity, reverse engineering, machine learning, database
PDF Download (click here)
|
|
|
|
|