Command Execution Bypassing Evasion Based on Win32Net Module
Corresponding Author
Dewei Ou
Available Online 31 August 2024.
- DOI
- 10.2991/978-94-6463-490-7_39How to use a DOI?
- Copyright
- © 2024 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Shengke Ye AU - Weiqiang Qin AU - Tinghua Chen AU - Dewei Ou AU - Genhai Zhang PY - 2024 DA - 2024/08/31 TI - Command Execution Bypassing Evasion Based on Win32Net Module BT - Proceedings of the 2024 3rd International Conference on Artificial Intelligence, Internet and Digital Economy (ICAID 2024) PB - Atlantis Press SP - 354 EP - 366 SN - 2589-4919 UR - https://doi.org/10.2991/978-94-6463-490-7_39 DO - 10.2991/978-94-6463-490-7_39 ID - Ye2024 ER -