Results 71 to 80 of about 31,501 (227)

A Hybrid Framework for Stock Price Forecasting Using Metaheuristic Feature Selection Approaches and Transformer Models Enhanced by Temporal Embedding and Attention Pruning

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani   +3 more
wiley   +1 more source

A Machine Learning Framework for Detecting and Preventing Cyber‐Attacks in Industrial Cyber‐Physical Systems

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha   +14 more
wiley   +1 more source

File Entropy Signal Analysis Combined With Wavelet Decomposition for Malware Classification

open access: yesIEEE Access, 2020
With the rapid development of the Internet, malware variants have increased exponentially, which poses a key threat to cyber security. Persistent efforts have been made to classify malware variants, but there are still many challenges, including the ...
Hui Guo   +5 more
doaj   +1 more source

Research on the Construction of Malware Variant Datasets and Their Detection Method

open access: yesApplied Sciences, 2022
Malware detection is of great significance for maintaining the security of information systems. Malware obfuscation techniques and malware variants are increasingly emerging, but their samples and API (application programming interface) sequences are ...
Faming Lu   +4 more
doaj   +1 more source

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

An automated classification system based on the strings of trojan and virus families

open access: yes, 2009
Classifying malware correctly is an important research issue for anti-malware software producers. This paper presents an effective and efficient malware classification technique based on string information using several wellknown classification ...
Batten, Lynn   +3 more
core   +1 more source

SQLi‐ScanEval: A Framework for Design and Evaluation of SQLi Detection Using Vulnerability and Penetration Testing Scanners

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
This paper proposes SQLi‐ScanEval Framework, a standardized SQLi detection system that integrates vulnerability and penetration testing scanners into a standardized framework. It tested seven prominent SQLi vulnerability scanners including OWASP ZAP, Wapiti, Vega, Acunetix, Invicti, Burp Suite, and Arachni on two prominent vulnerable testing ...
Hajira Bashir   +6 more
wiley   +1 more source

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

open access: yes, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +1 more source

Malware Classification Using Ensemble Classifiers [PDF]

open access: yesAdvanced Science Letters, 2018
Antimalware offers detection mechanism to detect and take appropriate action against malware detected. To evade detection, malware authors had introduced polymorphism to malware. In order to be effectively analyzing and classifying large amount of malware, it is necessary to group and identify them into their corresponding families.
Mohd Hanafi Ahmad Hijazi   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy