Results 51 to 60 of about 6,902 (163)

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

ADAPTATION AS A CONCEPT OF INFORMATION SECURITY MANAGEMENT FOR SPECIAL-PURPOSE AUTOMATED SYSTEMS AGAINST MALICIOUS SOFTWARE

open access: yesБезопасность информационных технологий
The article proposes an idea of implementing adaptive control principles to ensure information security in Special-Purpose Automated Systems (SPAS) against Malicious Software (Malware).
Ruslan A. Khvorov
doaj   +1 more source

The Evaluation Indexes and Defence Methods of Critical Information Nodes in Power Information Physical System Considering False Data Injection Attack Propagation

open access: yesIET Energy Systems Integration, Volume 8, Issue 1, January/December 2026.
ABSTRACT False data injection (FDI) attacks pose a great threat to the safe operation of power grid. By attacking nodes with weak defences, high transmission risks and high returns, attackers can cause more damage to the power grid with limited resources.
Xinrui Liu   +5 more
wiley   +1 more source

CCL19 and CCR7 Expression, Signaling Pathways, and Adjuvant Functions in Viral Infection and Prevention

open access: yesFrontiers in Cell and Developmental Biology, 2019
Chemokine (C–C motif) ligand 19 (CCL19) is a critical regulator of the induction of T cell activation, immune tolerance, and inflammatory responses during continuous immune surveillance, homeostasis, and development. Migration of CC-chemokine receptor 7 (
Yan Yan   +11 more
doaj   +1 more source

Optimizing Fast Learning Network Using Fuzzy Adaptive Metaheuristic Algorithms for Robust Intrusion Detection

open access: yesApplied Computational Intelligence and Soft Computing, Volume 2026, Issue 1, 2026.
In today’s digital era, the prevalence of cyberattacks requires robust security measures to keep sensitive and confidential information and infrastructure safe and secure. The intrusion detection system (IDS) plays the most vital role in this aspect by serving as a first‐line defense against these malicious activities and potential breaches. This paper
Fakhrud Din   +6 more
wiley   +1 more source

Comparative Analysis of Phenolic Accumulation Throughout Maturation in Five New White Wine Grape Varieties Under Temperate Monsoon Climate Conditions in Yantai

open access: yesAustralian Journal of Grape and Wine Research, Volume 2026, Issue 1, 2026.
While phenolics determine wine’s sensory and functional properties, white grape varieties remain less studied than red grape varieties in terms of phenolic profiling. Five white grape varieties and Chardonnay (control) were analyzed from veraison to bottling for phenolics and physicochemical properties to identify suitable cultivars for temperate ...
Dan Wang   +9 more
wiley   +1 more source

Analisa Metasploit Framework “msfvenom” Backdoor Trojan dan Fully Undetected (FUD) Trojan

open access: yesTechno.Com
Pengunaan teknologi informasi berupa penggunaan internet di Indonesia terus mengalami peningkatan sejak 2 dekade terakhir hingga 73,24% atau 202 juta jiwa dari 275.77 juta jiwa penduduk Indonesia.
Mursalim Mursalim   +2 more
doaj   +1 more source

A Comparative Study of Two Different Polarity Extracts of Angelica sinensis on Growth, Body Composition, and Metabolism in Juvenile Carp

open access: yesAquaculture Nutrition, Volume 2026, Issue 1, 2026.
This study investigated the effects of low and high polarity extracts (LPE and HPE) of Angelica sinensis (AS) on growth, body composition, and metabolism in carp (Cyprinus carpio var. Jian). Over a 42‐day period, 780 fish were randomly separated into 13 groups with three replicate aquariums respectively.
Huatao Li   +8 more
wiley   +1 more source

Dynamical Modeling and Analysis of Worm Propagation in Networks

open access: yesDiscrete Dynamics in Nature and Society, Volume 2026, Issue 1, 2026.
It is very important to study the model of worm propagation and analyze its dynamic evolution for understanding and mitigating network security threats. In this paper, considering network heterogeneity and two ways of worm propagation: scanning IP addresses and network‐sharing propagation, we develop a new model to study the dynamics of worm ...
Shujuan Zhang, Yihong Li, Aceng Sambs
wiley   +1 more source

Home - About - Disclaimer - Privacy