Results 31 to 40 of about 4,106 (161)

Benchmarking Android malware analysis tools

open access: yesElectronics, 2023
Abstract Today, malware is arguably one of the biggest challenges organizations face from a cybersecurity standpoint, regardless of the types of devices used in the organization. One of the most malware-attacked mobile operating systems today is Android.
Javier Bermejo Higuera   +5 more
openaire   +1 more source

Homology analysis of malware based on graph

open access: yesTongxin xuebao, 2017
Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph ...
Bing-lin ZHAO   +4 more
doaj   +2 more sources

Packed malware variants detection using deep belief networks [PDF]

open access: yesMATEC Web of Conferences, 2020
Malware is one of the most serious network security threats. To detect unknown variants of malware, many researches have proposed various methods of malware detection based on machine learning in recent years.
Zhang Zhigang   +3 more
doaj   +1 more source

Malware analysis

open access: yes
In this thesis, we delve into the intricate world of malware analysis, shedding light on both static and dynamic approaches, along with the development of an automation tool. Static analysis unveils the inner workings of malware structures without triggering execution, employing REMnux tools to gain crucial insights.
Joakim Kävrestad   +2 more
  +5 more sources

Sustainability Challenges to the Steel Industry in a Developing Country: Sanctions and Security Issues at the Forefront

open access: yesBusiness Strategy and the Environment, EarlyView.
ABSTRACT This article contributes to sustainability research by investigating the complex, geopolitically induced challenges faced by industrial supply chains under international sanctions. Using Iran's steel industry as a case, it examines sustainability barriers through the lens of stakeholder theory. A mixed methods approach was employed.
Seyed Hamed Moosavirad   +2 more
wiley   +1 more source

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System

open access: yesIEEE Access, 2018
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad   +5 more
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Windows malware analysis

open access: yes, 2021
The scope of this thesis is the study of Malware Analysis on Windows environment in a systematic and detailed manner, based on SAMA methodology. Furthermore, taking under consideration the ENISA guidelines, a laboratory was created, which is modular and capable of isolating the infected VMs, providing them with Internet connection or simulating one ...
openaire   +1 more source

Finding Minimum‐Cost Explanations for Predictions Made by Tree Ensembles

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT The ability to reliably explain why a machine learning model arrives at a particular prediction is crucial when used as decision support by human operators of critical systems. The provided explanations must be provably correct, and preferably without redundant information, called minimal explanations.
John Törnblom   +2 more
wiley   +1 more source

Dynamic Analysis for IoT Malware Detection With Convolution Neural Network Model

open access: yesIEEE Access, 2020
Internet of Things (IoT) technology provides the basic infrastructure for a hyper connected society where all things are connected and exchange information through the Internet.
Jueun Jeon   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy