Results 51 to 60 of about 4,106 (161)
ABSTRACT Objectives Binge eating is the most common disordered eating behavior among pregnant women. This study examined the association of binge‐eating frequency with the presence of a self‐reported current preeclampsia diagnosis in a sample of U.S. military active‐duty Service women. Methods Active‐duty Service women (N = 134), 20–27 weeks gestation,
Ruby Schrag +10 more
wiley +1 more source
MalQwen: Fine Tuned LLM for Static Android Malware Analysis Report
The Android operating system continues to face escalating security challenges, primarily due to its open-source nature and the rapid proliferation of applications from untrusted sources.
Tegar Ganang Satrio Priambodo +7 more
doaj +1 more source
Android Platform Malware Analysis [PDF]
Mobile devices have evolved from simple devices, which are used for a phone call and SMS messages to smartphone devices that can run third party applications. Nowadays, malicious software, which is also known as malware, imposes a larger threat to these mobile devices.
Khalid Alfalqi +2 more
openaire +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Classification of Malware Images Using Fine-Tunned ViT
Malware detection and classification have become critical tasks in ensuring the security and integrity of computer systems and networks. Traditional methods of malware analysis often rely on signature-based approaches, which struggle to cope with the ...
Özal Yıldırım, Oğuzhan Katar
doaj +1 more source
An Open Source, Extensible Malware Analysis Platform
A malware (such as viruses, ransomware) is the main source of bringing serious security threats to the IT systems and their users now-adays. In order to protect the systems and their legitimate users from these threats, anti-malware applications are ...
Michalopoulos P. +3 more
doaj +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
A cybersecurity risk analysis framework for systems with artificial intelligence components
Abstract The introduction of the European Union Artificial Intelligence (AI) Act, the NIST AI Risk Management Framework, and related international norms and policy documents demand a better understanding and implementation of novel risk analysis issues when facing systems with AI components: dealing with new AI‐related impacts; incorporating AI‐based ...
J.M. Camacho +3 more
wiley +1 more source
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley +1 more source

