Results 71 to 80 of about 97,198 (223)
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani +3 more
wiley +1 more source
Large-Scale Analysis on Anti-Analysis Techniques in Real-World Malware
To dynamically identify malicious behaviors of millions of Windows malware, anti-virus vendors have widely been using sandbox-based analyzers. However, the sandbox-based analysis has a critical limitation that anti-analysis techniques (i.e., Anti-sandbox
Minho Kim, Haehyun Cho, Jeong Hyun Yi
doaj +1 more source
PlaceRaider: Virtual Theft in Physical Spaces with Smartphones [PDF]
As smartphones become more pervasive, they are increasingly targeted by malware. At the same time, each new generation of smartphone features increasingly powerful onboard sensor suites.
Crandall, David +3 more
core
The Influence of Big Data‐Driven Educational Technologies on College Teaching Development
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley +1 more source
A3CM: Automatic Capability Annotation for Android Malware
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so ...
Junyang Qiu +6 more
doaj +1 more source
Security Toolbox for Detecting Novel and Sophisticated Android Malware
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom +4 more
core +1 more source
Malware and Malware Detection Techniques: A Survey
Abstract: Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of malicious software are worsen to the client.
Sahil Sehrawat, Dr. Dinesh Singh
openaire +1 more source
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha +14 more
wiley +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
Generating Synthetic Malware Samples Using Generative AI
Malware attacks have a significant negative impact on organizations of varied scales in the field of cybersecurity. Recently, malware researchers have increasingly turned to machine learning techniques to combat sophisticated obfuscation methods used in ...
Tiffany Bao +4 more
doaj +1 more source

