Adaptive malware identification via integrated SimCLR and GRU networks. [PDF]
Alsubaei FS +5 more
europepmc +1 more source
A generative AI cybersecurity risks mitigation model for code generation: using ANN-ISM hybrid approach. [PDF]
Al-Hashimi HA.
europepmc +1 more source
Evading Antivirus Detection Using Fountain Code-Based Techniques for Executing Shellcodes. [PDF]
Huang GC, Chang KC, Lai TH.
europepmc +1 more source
Detection of unseen malware threats using generative adversarial networks and deep learning models. [PDF]
Joshi C, Kumar J, Kumawat G.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
SENSH: a blockchain-based searchable encrypted data sharing scheme in smart healthcare. [PDF]
Luo S, Tan L, Hu T, Hu M.
europepmc +1 more source
Platform Independent Code Obfuscation
Code obfuscation is a technique used to make soft- ware more difficult to read and reverse engineer. It is used in the industry to protect proprietary algo- rithms and to protect the software from unintended use. The current state of the art solutions in the in- dustry depend on specific platform targets.
openaire +2 more sources
Epidemiological trends and indications of shoulder arthroscopy among 191,549 patients in the United States. [PDF]
Burkhart RJ +9 more
europepmc +1 more source
Transfer learning with XAI for robust malware and IoT network security. [PDF]
Almadhor A +6 more
europepmc +1 more source
A graph attention network-based multi-agent reinforcement learning framework for robust detection of smart contract vulnerabilities. [PDF]
Adjei PK +7 more
europepmc +1 more source

