Results 71 to 80 of about 81,305 (190)

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

open access: yes, 2019
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social ...
Biggio, Battista   +2 more
core   +1 more source

Cyberattacks on Small Banks and the Impact on Local Banking Markets

open access: yesJournal of Money, Credit and Banking, EarlyView.
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN   +2 more
wiley   +1 more source

Malware and Malware Detection Techniques: A Survey

open access: yesInternational Journal for Research in Applied Science and Engineering Technology, 2022
Abstract: Malicious software is a kind of software or codes which took some: private data, information from the PC framework, its tasks is to do only malicious objectives to the PC framework, without authorization of the PC clients. The effect of malicious software are worsen to the client.
Sahil Sehrawat, Dr. Dinesh Singh
openaire   +1 more source

ConvProtoNet: Deep Prototype Induction towards Better Class Representation for Few-Shot Malware Classification

open access: yesApplied Sciences, 2020
Traditional malware classification relies on known malware types and significantly large datasets labeled manually which limits its ability to recognize new malware classes.
Zhijie Tang, Peng Wang, Junfeng Wang
doaj   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

A3CM: Automatic Capability Annotation for Android Malware

open access: yesIEEE Access, 2019
Android malware poses serious security and privacy threats to the mobile users. Traditional malware detection and family classification technologies are becoming less effective due to the rapid evolution of the malware landscape, with the emerging of so ...
Junyang Qiu   +6 more
doaj   +1 more source

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

Generating Synthetic Malware Samples Using Generative AI

open access: yesIEEE Access
Malware attacks have a significant negative impact on organizations of varied scales in the field of cybersecurity. Recently, malware researchers have increasingly turned to machine learning techniques to combat sophisticated obfuscation methods used in ...
Tiffany Bao   +4 more
doaj   +1 more source

CAR‐T Cells: Current Status, Challenges, and Future Prospects

open access: yesMedComm, Volume 7, Issue 5, May 2026.
This graphical abstract outlines the current status, challenges, and future prospects of CAR‐T cells. The biological basis of CAR‐T cell therapy is the elegant redirection of adaptive immunity. Its initial successes have exposed a landscape of multifaceted challenges.
Aya Sedky Adly   +6 more
wiley   +1 more source

RogueGPT: Unleashing Jailbreak Prompts on LLMs

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
ABSTRACT Large Language Models (LLMs) have seen a remarkable surge in popularity since the latter part of 2022. These models have become vital in the lives of individuals from varying professions. While some users leverage LLMs for academic or informational purposes, others exploit them for illicit activities.
Arpitha Shivaswaroopa   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy