Results 1 to 10 of about 196,474 (374)

Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022

open access: yesJournal of Cybersecurity and Privacy, 2023
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021

open access: yesJournal of Cybersecurity and Privacy, 2022
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj   +1 more source

System API Vectorization for Malware Detection

open access: yesIEEE Access, 2023
Data is essential to the performance of artificial intelligence (AI) based malware detection models. System APIs, which allocate operating system resources, are important for identifying malicious behaviors.
Kyounga Shin   +4 more
doaj   +1 more source

Shared Mobility for Transport and Its Environmental Impact VeSIPreS: A Vehicular Soft Integrity Preservation Scheme for Shared Mobility

open access: yesJournal of Advanced Transportation, 2021
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicle is owned and driven by one or only a few other persons, and towards shared-mobility concepts.
Valaenthin Tratter   +2 more
doaj   +1 more source

Developing and evaluating cybersecurity competencies for students in computing programs [PDF]

open access: yesPeerJ Computer Science, 2022
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari   +2 more
doaj   +2 more sources

Institutional Strategies for Cybersecurity in Higher Education Institutions

open access: yesInformation, 2022
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj   +1 more source

Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API

open access: yesIEEE Access, 2020
With the rapid advances of anti-virus and anti-tracking technologies, three aspects in malware clustering need to be improved for effective clustering, i.e., the robustness of features, the accuracy of similarity measurements, and the effectiveness of ...
Yong Fang   +4 more
doaj   +1 more source

A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks

open access: yesIEEE Access, 2020
In complex networks, identifying influential nodes is of great importance for its wide applications. Traditional centrality methods are usually directly based on topological structures of networks, and different centrality methods consider different ...
Gouheng Zhao   +4 more
doaj   +1 more source

Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification

open access: yesIEEE Access, 2019
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng   +6 more
doaj   +1 more source

Cross-Site Scripting Guardian: A Static XSS Detector Based on Data Stream Input-Output Association Mining

open access: yesApplied Sciences, 2020
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy