Results 51 to 60 of about 6,902 (163)
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
The article proposes an idea of implementing adaptive control principles to ensure information security in Special-Purpose Automated Systems (SPAS) against Malicious Software (Malware).
Ruslan A. Khvorov
doaj +1 more source
ABSTRACT False data injection (FDI) attacks pose a great threat to the safe operation of power grid. By attacking nodes with weak defences, high transmission risks and high returns, attackers can cause more damage to the power grid with limited resources.
Xinrui Liu +5 more
wiley +1 more source
Chemokine (C–C motif) ligand 19 (CCL19) is a critical regulator of the induction of T cell activation, immune tolerance, and inflammatory responses during continuous immune surveillance, homeostasis, and development. Migration of CC-chemokine receptor 7 (
Yan Yan +11 more
doaj +1 more source
In today’s digital era, the prevalence of cyberattacks requires robust security measures to keep sensitive and confidential information and infrastructure safe and secure. The intrusion detection system (IDS) plays the most vital role in this aspect by serving as a first‐line defense against these malicious activities and potential breaches. This paper
Fakhrud Din +6 more
wiley +1 more source
While phenolics determine wine’s sensory and functional properties, white grape varieties remain less studied than red grape varieties in terms of phenolic profiling. Five white grape varieties and Chardonnay (control) were analyzed from veraison to bottling for phenolics and physicochemical properties to identify suitable cultivars for temperate ...
Dan Wang +9 more
wiley +1 more source
Analisa Metasploit Framework “msfvenom” Backdoor Trojan dan Fully Undetected (FUD) Trojan
Pengunaan teknologi informasi berupa penggunaan internet di Indonesia terus mengalami peningkatan sejak 2 dekade terakhir hingga 73,24% atau 202 juta jiwa dari 275.77 juta jiwa penduduk Indonesia.
Mursalim Mursalim +2 more
doaj +1 more source
This study investigated the effects of low and high polarity extracts (LPE and HPE) of Angelica sinensis (AS) on growth, body composition, and metabolism in carp (Cyprinus carpio var. Jian). Over a 42‐day period, 780 fish were randomly separated into 13 groups with three replicate aquariums respectively.
Huatao Li +8 more
wiley +1 more source
Dynamical Modeling and Analysis of Worm Propagation in Networks
It is very important to study the model of worm propagation and analyze its dynamic evolution for understanding and mitigating network security threats. In this paper, considering network heterogeneity and two ways of worm propagation: scanning IP addresses and network‐sharing propagation, we develop a new model to study the dynamics of worm ...
Shujuan Zhang, Yihong Li, Aceng Sambs
wiley +1 more source

