Results 71 to 80 of about 134,256 (265)

Evaluation of Supervised Machine Learning Techniques for Dynamic Malware Detection

open access: yesInternational Journal of Computational Intelligence Systems, 2018
Nowadays, security of the computer systems has become a major concern of security experts. In spite of many antivirus and malware detection systems, the number of malware incidents are increasing day by day.
Hongwei Zhao   +3 more
doaj   +1 more source

Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration

open access: yesJournal of Cybersecurity and Privacy, 2022
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools.
Niusen Chen, Bo Chen
doaj   +1 more source

Sustainability Challenges to the Steel Industry in a Developing Country: Sanctions and Security Issues at the Forefront

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This article contributes to sustainability research by investigating the complex, geopolitically induced challenges faced by industrial supply chains under international sanctions. Using Iran's steel industry as a case, it examines sustainability barriers through the lens of stakeholder theory. A mixed methods approach was employed.
Seyed Hamed Moosavirad   +2 more
wiley   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Generative Adversarial Network for Global Image-Based Local Image to Improve Malware Classification Using Convolutional Neural Network

open access: yesApplied Sciences, 2020
Malware detection and classification methods are being actively developed to protect personal information from hackers. Global images of malware (in a program that includes personal information) can be utilized to detect or classify it.
Sejun Jang, Shuyu Li, Yunsick Sung
doaj   +1 more source

Mal-Detect: An intelligent visualization approach for malware detection

open access: yesJournal of King Saud University: Computer and Information Sciences, 2022
Recent outbreaks of pandemics have deepened the adoption and use of IT-based systems. This development has led to an exponential increase in cyberattacks caused by malware.
Olorunjube James Falana   +3 more
doaj   +1 more source

Malware vs Anti-Malware Battle - Gotta Evade ‘em All! [PDF]

open access: yes2020 IEEE Symposium on Visualization for Cyber Security (VizSec), 2020
The landscape of malware development is ever-changing, creating a constant catch-up contest between the defenders and the adversaries. One of the methodologies that has the potential to pose a significant threat to systems is malware evasion. This is where malware tries to determine whether it is run in a controlled environment, such as a sandbox ...
Chaffey, E., Sgandurra, D.
openaire   +1 more source

Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task

open access: yesInternational Journal of Mechanical System Dynamics, EarlyView.
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger   +2 more
wiley   +1 more source

Android malware detection and identification frameworks by leveraging the machine and deep learning techniques: A comprehensive review

open access: yesTelematics and Informatics Reports
The ever-increasing growth of online services and smart connectivity of devices have posed the threat of malware to computer system, android-based smart phones, Internet of Things (IoT)-based systems.
Santosh K. Smmarwar   +2 more
doaj   +1 more source

Finding Minimum‐Cost Explanations for Predictions Made by Tree Ensembles

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT The ability to reliably explain why a machine learning model arrives at a particular prediction is crucial when used as decision support by human operators of critical systems. The provided explanations must be provably correct, and preferably without redundant information, called minimal explanations.
John Törnblom   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy