Results 11 to 20 of about 590 (134)

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

AInsectID Version 1.1: An Insect Species Identification Software Based on the Transfer Learning of Deep Convolutional Neural Networks

open access: yesAdvanced Intelligent Discovery, Volume 1, Issue 2, August 2025.
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley   +1 more source

Leveraging Ethical Narratives to Enhance LLM‐AutoML Generated Machine Learning Models

open access: yesExpert Systems, Volume 42, Issue 7, July 2025.
ABSTRACT The growing popularity of generative AI and large language models (LLMs) has sparked innovation alongside debate, particularly around issues of plagiarism and intellectual property law. However, a less‐discussed concern is the quality of code generated by these models, which often contains errors and encourages poor programming practices. This
Jordan Nelson   +4 more
wiley   +1 more source

Android Malware Detection Using Autoencoder

open access: yes, 2019
9 Pages, 4 Figures, 3 ...
Naway, Abdelmonim, Li, Yuancheng
openaire   +2 more sources

Towards Explainable CNNs for Android Malware Detection

open access: yesProcedia Computer Science, 2021
Abstract A challenge for implementing deep learning research in the real-world is the availability of techniques that explain predictions of a model, particularly in light of potential legal requirements to give an account of algorithmic outcomes for certain use-cases.
Kinkead, Martin   +3 more
openaire   +3 more sources

2025 Japanese Heart Rhythm Society / Japanese Circulation Society Consensus Statement on the Appropriate Use of Ambulatory and Wearable Electrocardiographs

open access: yesJournal of Arrhythmia, Volume 41, Issue 3, June 2025.
Recently, some clinicians have been diagnosing and treating arrhythmias on the basis of electrocardiogram (ECG) devices with low accuracy. In Europe and the US, several statements on the use of ECGs have already been published by related academic societies.
Takanori Ikeda   +22 more
wiley   +1 more source

Home - About - Disclaimer - Privacy