Results 51 to 60 of about 25,310,274 (105)

Generating Pattern‐Based Datasets for Cyber Attack Detection Using Machine‐Learning Techniques

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 2, June 2026.
The aim of this work is to review the state of the art in the design, generation, and labeling of attack pattern datasets for training of detection systems based on machine learning. ABSTRACT This work aims to review the state of the art in the design, generation, and labeling of attack pattern datasets for the training of detection systems based on ...
Pedro Díaz García   +4 more
wiley   +1 more source

An overview of ADSL homed nepenthes honeypots in Western Australia [PDF]

open access: yes, 2007
This paper outlines initial analysis from research in progress into ADSL homed Nepenthes honeypots. One of the Nepenthes honeypots prime objective in this research was the collection of malware for analysis and dissection.
Valli, Craig, Wooten, Aaron
core   +1 more source

Fuzzy-Import Hashing: A Malware Analysis Approach

open access: yesIEEE International Conference on Fuzzy Systems, 2020
Malware has remained a consistent threat since its emergence, growing into a plethora of types and in large numbers. In recent years, numerous new malware variants have enabled the identification of new attack surfaces and vectors, and have become a ...
N. Naik   +5 more
semanticscholar   +1 more source

Accelerated‐USE: A Benchmark Framework for GPU‐Driven Graph Neural Network Training

open access: yesConcurrency and Computation: Practice and Experience, Volume 38, Issue 9, May 2026.
ABSTRACT Graph processing is used in many domains to extract knowledge from real‐world data. With the rise of deep neural networks and scaled compute infrastructure in artificial intelligence (AI), specialized techniques emerged to leverage graphs in applications such as recommendation systems and social networks.
Lucas de Angelo Martins Ribeiro   +5 more
wiley   +1 more source

Android Malware Detection Using Support Vector Regression for Dynamic Feature Analysis

open access: yesInf.
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis ...
Nahier Aldhafferi
semanticscholar   +1 more source

CAR‐T Cells: Current Status, Challenges, and Future Prospects

open access: yesMedComm, Volume 7, Issue 5, May 2026.
This graphical abstract outlines the current status, challenges, and future prospects of CAR‐T cells. The biological basis of CAR‐T cell therapy is the elegant redirection of adaptive immunity. Its initial successes have exposed a landscape of multifaceted challenges.
Aya Sedky Adly   +6 more
wiley   +1 more source

RogueGPT: Unleashing Jailbreak Prompts on LLMs

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
ABSTRACT Large Language Models (LLMs) have seen a remarkable surge in popularity since the latter part of 2022. These models have become vital in the lives of individuals from varying professions. While some users leverage LLMs for academic or informational purposes, others exploit them for illicit activities.
Arpitha Shivaswaroopa   +4 more
wiley   +1 more source

History of malware

open access: yes, 2013
In past three decades almost everything has changed in the field of malware and malware analysis. From malware created as proof of some security concept and malware created for financial gain to malware created to sabotage infrastructure. In this work we
Milošević, Nikola
core  

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

Lightweight and Explainable Early Ransomware Detection Using Dynamic API‐Call Features and Ensemble Machine Learning

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This study presents a lightweight and explainable ransomware detection framework using dynamic API‐call features and ensemble machine learning. The LightGBM model achieves high accuracy (AUC = 0.9937) with low false positives. SHAP‐based feature importance reveals key API behaviors enabling interpretable, efficient, and deployment‐ready ransomware ...
Zain ul Abideen Khan   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy