Results 61 to 70 of about 4,106 (161)

A Hybrid Framework for Stock Price Forecasting Using Metaheuristic Feature Selection Approaches and Transformer Models Enhanced by Temporal Embedding and Attention Pruning

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani   +3 more
wiley   +1 more source

Deep Belief Networks-based framework for malware detection in Android systems

open access: yesAlexandria Engineering Journal, 2018
Malware is the umbrella term that denotes attacking any system by malicious software. During the last few years, the popularity of Android smartphones led to the sneak of several malware applications into different Android markets without any difficulty.
Dina Saif, S.M. El-Gokhy, E. Sallam
doaj   +1 more source

Algor‐Ethics in Diabetes Care: Mapping the Route

open access: yesDiabetes/Metabolism Research and Reviews, Volume 42, Issue 2, February 2026.
ABSTRACT Diabetes mellitus represents a multifaceted global health challenge, frequently coexisting with obesity, cardiovascular complications, and metabolic disorders. Effective management requires individualised, evidence‐based decisions informed by an array of clinical, genetic, and lifestyle data.
Joshua Bemporad   +2 more
wiley   +1 more source

Reverse Engineering untuk Analisis Malware Remote Access Trojan

open access: yesJEPIN (Jurnal Edukasi dan Penelitian Informatika), 2019
Para hacker menggunakan malware Remote Access Trojan untuk merusak sistem kemudian mencuri data para korbannya. Diperlukan analisis mendalam mengenai malware baru-baru ini karena malware dapat berkamuflase seperti sistem tidak dicurigai.
Tesa Pajar Setia   +2 more
doaj   +1 more source

Undecidable problems in malware analysis

open access: yes2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), 2017
Malware analysis is a challenging task in the theory as well as the practice of computer science. Many important problems in malware analysis have been shown to be undecidable. These problems include virus detection, detecting unpacking execution, matching malware samples against a set of given templates, and detecting trigger-based behavior.
Batur, Berker   +2 more
openaire   +2 more sources

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

Integrated Analysis of Malicious Software: Insights from Static and Dynamic Perspectives

open access: yesJournal of Cybersecurity and Privacy
Malware remains one of the most persistent and evolving threats to cybersecurity, necessitating robust analysis techniques to understand and mitigate its impact.
Maria-Mădălina Andronache   +2 more
doaj   +1 more source

A Novel Approach to Detect Malware Based on API Call Sequence Analysis

open access: yesInternational Journal of Distributed Sensor Networks, 2015
In the era of ubiquitous sensors and smart devices, detecting malware is becoming an endless battle between ever-evolving malware and antivirus programs that need to process ever-increasing security related data. For malware detection, various approaches
Youngjoon Ki, Eunjin Kim, Huy Kang Kim
doaj   +1 more source

NETWORK MALWARE ANALYSIS

open access: yes, 2022
Malware is one of the problems really existing in the modern post-industrial society. Hackers continuously develop novel techniques to intrude into computer systems for various reasons, so many security researchers should analyze and track new malicious program to protect sensitive information for the computer system.
openaire   +1 more source

I-MCM: IoT Malware Counter Measures for Cross-Architecture IoT Malware Detection

open access: yesIEEE Access
The recent attacks initiated by malware-infected IoT devices illustrate that these attacks have tremendous impacts not only on the targeted systems but also on the entire internet infrastructure.
Ibrahim Gulatas   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy