Results 81 to 90 of about 81,305 (190)
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we
Milošević, Nikola
core
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan +4 more
wiley +1 more source
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Detecting Malware C&C Communication Traffic Using Artificial Intelligence Techniques
Banking malware poses a significant threat to users by infecting their computers and then attempting to perform malicious activities such as surreptitiously stealing confidential information from them.
Mohamed Ali Kazi
doaj +1 more source
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo +4 more
wiley +1 more source
DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of ...
Xin Su +5 more
doaj +1 more source
Testing Android Anti-Malware against Malware Obfuscations
is an increasing threat of malware on mobile. Since Android is the most popular and maximum sold mobile phone, the malware attack on Android mobile is increasing day by day. The commercial antimalware products available in the market can detect common and old malwares easily.
Aruna Gupta, Gunjan Kapse
openaire +1 more source
MalSSL—Self-Supervised Learning for Accurate and Label-Efficient Malware Classification
Malware classification with supervised learning requires a large dataset, which needs an expensive and time-consuming labeling process. In this paper, we explore the efficacy of self-supervised learning techniques for malware classification.
Setia Juli Irzal Ismail +4 more
doaj +1 more source
A Data Mining Classification Approach for Behavioral Malware Detection
Data mining techniques have numerous applications in malware detection. Classification method is one of the most popular data mining techniques. In this paper we present a data mining classification approach to detect malware behavior.
Monire Norouzi +2 more
doaj +1 more source

