Results 41 to 50 of about 9,623 (197)

Artificial intelligence‐powered microscopy: Transforming the landscape of parasitology

open access: yesJournal of Microscopy, Volume 301, Issue 2, Page 280-329, February 2026.
Abstract Microscopy and image analysis play a vital role in parasitology research; they are critical for identifying parasitic organisms and elucidating their complex life cycles. Despite major advancements in imaging and analysis, several challenges remain. These include the integration of interdisciplinary data; information derived from various model
Mariana De Niz   +4 more
wiley   +1 more source

Trojans in Early Design Steps—An Emerging Threat [PDF]

open access: yes, 2016
Hardware Trojans inserted by malicious foundries during integrated circuit manufacturing have received substantial attention in recent years. In this paper, we focus on a different type of hardware Trojan threats: attacks in the early steps of design
Becker, Georg T.   +2 more
core  

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

A security method of hardware Trojan detection using path tracking algorithm

open access: yesEURASIP Journal on Wireless Communications and Networking, 2022
Recently, the issue of malicious circuit alteration and attack draws more attention than ever before due to the globalization of IC design and manufacturing.
Der-Chen Huang   +3 more
doaj   +1 more source

Consistent Interpretation of Ensemble Classifiers in Trojan-Horse Detection

open access: yesIEEE Access, 2023
Hardware trojan classification/detection systems (HTDs) based on machine or deep learning have recently been proven to be effective. However, the existence of irrelevant features as well as class imbalance reduces the effectiveness of these models.
Rama Devi Maddineni, Deepak Ch
doaj   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

A machine learning method for hardware Trojan detection on real chips

open access: yesAIP Advances, 2021
Due to the global supply chain of integrated circuits (IC) from design to application, Hardware Trojan (HT) may be stealthily inserted into ICs. The effect of HT detection methods are related to the signal-to-noise ratio (SNR) and the Trojan-to-circuit ...
C. Sun   +5 more
doaj   +1 more source

A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [PDF]

open access: yes, 2017
The semiconductor industry is fully globalized and integrated circuits (ICs) are commonly defined, designed and fabricated in different premises across the world. This reduces production costs, but also exposes ICs to supply chain attacks, where insiders
Cerulli, Andrea   +5 more
core   +1 more source

ACTIC: A Large Language Model‐Based Method for Threat Intelligence Perception

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This paper proposes a study that introduces an automated method for constructing a threat intelligence knowledge graph construction method based on using large language models, named ACTIC. This approach utilises a locally deployed DeepSeek‐32B model and employs, combined with prompt engineering and Low‐Rank Adaptation (LoRA) fine‐tuning, to extract ...
Changcheng Liu, Changheng Yang, Jun Ma
wiley   +1 more source

Home - About - Disclaimer - Privacy