Results 111 to 120 of about 134,256 (265)

Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques

open access: yesJournal of Cybersecurity and Privacy
Banking malware poses a significant threat to users by infecting their computers and then attempting to perform malicious activities such as surreptitiously stealing confidential information from them.
Mohamed Ali Kazi
doaj   +1 more source

A Hybrid Framework for Stock Price Forecasting Using Metaheuristic Feature Selection Approaches and Transformer Models Enhanced by Temporal Embedding and Attention Pruning

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani   +3 more
wiley   +1 more source

Algor‐Ethics in Diabetes Care: Mapping the Route

open access: yesDiabetes/Metabolism Research and Reviews, Volume 42, Issue 2, February 2026.
ABSTRACT Diabetes mellitus represents a multifaceted global health challenge, frequently coexisting with obesity, cardiovascular complications, and metabolic disorders. Effective management requires individualised, evidence‐based decisions informed by an array of clinical, genetic, and lifestyle data.
Joshua Bemporad   +2 more
wiley   +1 more source

Testing Android Anti-Malware against Malware Obfuscations

open access: yesInternational Journal of Computer Applications, 2015
is an increasing threat of malware on mobile. Since Android is the most popular and maximum sold mobile phone, the malware attack on Android mobile is increasing day by day. The commercial antimalware products available in the market can detect common and old malwares easily.
Aruna Gupta, Gunjan Kapse
openaire   +1 more source

MalSSL—Self-Supervised Learning for Accurate and Label-Efficient Malware Classification

open access: yesIEEE Access
Malware classification with supervised learning requires a large dataset, which needs an expensive and time-consuming labeling process. In this paper, we explore the efficacy of self-supervised learning techniques for malware classification.
Setia Juli Irzal Ismail   +4 more
doaj   +1 more source

A Data Mining Classification Approach for Behavioral Malware Detection

open access: yesJournal of Computer Networks and Communications, 2016
Data mining techniques have numerous applications in malware detection. Classification method is one of the most popular data mining techniques. In this paper we present a data mining classification approach to detect malware behavior.
Monire Norouzi   +2 more
doaj   +1 more source

CSMC: A Secure and Efficient Visualized Malware Classification Method Inspired by Compressed Sensing

open access: yesSensors
With the rapid development of the Internet of Things (IoT), the sophistication and intelligence of sensors are continually evolving, playing increasingly important roles in smart homes, industrial automation, and remote healthcare.
Wei Wu   +3 more
doaj   +1 more source

PENGENALAN AKTIFITAS CYBER THREAT HUNTING : STUDI KASUS HUNTING MALWARE DENGAN METODE MEMORY FORENSIC

open access: diamond, 2022
Fadillah Nursyahiddin   +3 more
openalex   +1 more source

History of malware

open access: yes, 2013
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we
Milošević, Nikola
core  

Home - About - Disclaimer - Privacy