Results 51 to 60 of about 2,609 (164)

Cyberattacks on Small Banks and the Impact on Local Banking Markets

open access: yesJournal of Money, Credit and Banking, EarlyView.
Abstract Cyberattacks on small banks have direct and spillover effects in local markets. Following successful cyberattacks, hacked small banks experience a decline in deposit growth rates. This effect of cyberattacks is not observed in hacked large banks.
FABIAN GOGOLIN   +2 more
wiley   +1 more source

Android malware detection method based on deep neural network

open access: yes网络与信息安全学报, 2020
Android is increasingly facing the threat of malware attacks. It is difficult to effectively detect large-sample and multi-class malware for traditional machine learning methods such as support vector machine, method for Android malware detection and ...
CHAO Fan, YANG Zhi, DU Xuehui, SUN Yan
doaj   +1 more source

Visualized Malware Multi-Classification Framework Using Fine-Tuned CNN-Based Transfer Learning Models

open access: yesApplied Sciences, 2021
There is a massive growth in malicious software (Malware) development, which causes substantial security threats to individuals and organizations. Cybersecurity researchers makes continuous efforts to defend against these malware risks.
Walid El-Shafai   +2 more
doaj   +1 more source

A Survey for Deep Reinforcement Learning Based Network Intrusion Detection

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang   +3 more
wiley   +1 more source

File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification

open access: yesIEEE Access, 2020
With the rapid development of the Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts have been made to classify malware variants, but there are still many challenges, including the ...
Hui Guo   +5 more
doaj   +1 more source

Cybersecurity Assurance for SMEs: A Conceptual Framework Integrating Organizational Culture, Fraud Risk Management and Forensic Accounting

open access: yesCanadian Journal of Administrative Sciences / Revue Canadienne des Sciences de l'Administration, Volume 43, Issue 1, March 2026.
ABSTRACT As digitalization accelerates across the global economy, small and medium enterprises (SMEs) face increasing exposure to cybersecurity threats, not due to flaws in external platforms, but because of internal organizational vulnerabilities. This paper presents a conceptual framework that integrates the resource‐based view (RBV) and dynamic ...
Ifedapo Francis Awolowo   +4 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, Volume 14, Issue 3, Page 1431-1455, March 2026.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Malware Classification Using Ensemble Classifiers [PDF]

open access: yesAdvanced Science Letters, 2018
Antimalware offers detection mechanism to detect and take appropriate action against malware detected. To evade detection, malware authors had introduced polymorphism to malware. In order to be effectively analyzing and classifying large amount of malware, it is necessary to group and identify them into their corresponding families.
Mohd Hanafi Ahmad Hijazi   +4 more
openaire   +1 more source

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy