Results 1 to 10 of about 196,474 (374)
Acknowledgment to the Reviewers of Journal of Cybersecurity and Privacy in 2022
High-quality academic publishing is built on rigorous peer review [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
Acknowledgment to Reviewers of Journal of Cybersecurity and Privacy in 2021
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Journal of Cybersecurity and Privacy Editorial Office
doaj +1 more source
System API Vectorization for Malware Detection
Data is essential to the performance of artificial intelligence (AI) based malware detection models. System APIs, which allocate operating system resources, are important for identifying malicious behaviors.
Kyounga Shin+4 more
doaj +1 more source
Car manufacturers are noticing and encouraging a trend away from individual mobility, where a vehicle is owned and driven by one or only a few other persons, and towards shared-mobility concepts.
Valaenthin Tratter+2 more
doaj +1 more source
Developing and evaluating cybersecurity competencies for students in computing programs [PDF]
Changes due to technological development in the workplace are putting pressure on academia to keep pace with the changing nature of work. Due to the growing need for cybersecurity professionals, universities improve their cybersecurity programs to ...
Abdullah Alammari+2 more
doaj +2 more sources
Institutional Strategies for Cybersecurity in Higher Education Institutions
Cybersecurity threats have grown exponentially, posing a heavy burden on organisations. Higher Education Institutions (HEIs) are particularly vulnerable, and their cybersecurity issues are receiving greater attention.
Eric C. K. Cheng, Tianchong Wang
doaj +1 more source
Semi-Supervised Malware Clustering Based on the Weight of Bytecode and API
With the rapid advances of anti-virus and anti-tracking technologies, three aspects in malware clustering need to be improved for effective clustering, i.e., the robustness of features, the accuracy of similarity measurements, and the effectiveness of ...
Yong Fang+4 more
doaj +1 more source
A Machine Learning Based Framework for Identifying Influential Nodes in Complex Networks
In complex networks, identifying influential nodes is of great importance for its wide applications. Traditional centrality methods are usually directly based on topological structures of networks, and different centrality methods consider different ...
Gouheng Zhao+4 more
doaj +1 more source
Flow Context and Host Behavior Based Shadowsocks’s Traffic Identification
Cloud Virtual Private Server (VPS) services provide the chance of rapid deployment of anonymous proxy services, becoming an important part of many anonymous proxy solutions.
Xuemei Zeng+6 more
doaj +1 more source
The largest number of cybersecurity attacks is on web applications, in which Cross-Site Scripting (XSS) is the most popular way. The code audit is the main method to avoid the damage of XSS at the source code level.
Chenghao Li+3 more
doaj +1 more source