Results 111 to 120 of about 134,256 (265)
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Banking malware poses a significant threat to users by infecting their computers and then attempting to perform malicious activities such as surreptitiously stealing confidential information from them.
Mohamed Ali Kazi
doaj +1 more source
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani +3 more
wiley +1 more source
Algor‐Ethics in Diabetes Care: Mapping the Route
ABSTRACT Diabetes mellitus represents a multifaceted global health challenge, frequently coexisting with obesity, cardiovascular complications, and metabolic disorders. Effective management requires individualised, evidence‐based decisions informed by an array of clinical, genetic, and lifestyle data.
Joshua Bemporad +2 more
wiley +1 more source
Testing Android Anti-Malware against Malware Obfuscations
is an increasing threat of malware on mobile. Since Android is the most popular and maximum sold mobile phone, the malware attack on Android mobile is increasing day by day. The commercial antimalware products available in the market can detect common and old malwares easily.
Aruna Gupta, Gunjan Kapse
openaire +1 more source
MalSSL—Self-Supervised Learning for Accurate and Label-Efficient Malware Classification
Malware classification with supervised learning requires a large dataset, which needs an expensive and time-consuming labeling process. In this paper, we explore the efficacy of self-supervised learning techniques for malware classification.
Setia Juli Irzal Ismail +4 more
doaj +1 more source
A Data Mining Classification Approach for Behavioral Malware Detection
Data mining techniques have numerous applications in malware detection. Classification method is one of the most popular data mining techniques. In this paper we present a data mining classification approach to detect malware behavior.
Monire Norouzi +2 more
doaj +1 more source
CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing
With the rapid development of the Internet of Things (IoT), the sophistication and intelligence of sensors are continually evolving, playing increasingly important roles in smart homes, industrial automation, and remote healthcare.
Wei Wu +3 more
doaj +1 more source
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we
Milošević, Nikola
core

