Results 51 to 60 of about 4,236,332 (208)
On the Effectiveness of Perturbations in Generating Evasive Malware Variants
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin +3 more
doaj +1 more source
As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware.
Abimbola G. Akintola +9 more
doaj +1 more source
A Malware Detection Approach Using Autoencoder in Deep Learning
Today, in the field of malware detection, the expanding limitations of traditional detection methods and the increasing accuracy of detection methods designed on the basis of artificial intelligence algorithms are driving research findings in this area ...
Xiaofei Xing +4 more
semanticscholar +1 more source
SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad +5 more
doaj +1 more source
A Survey of the Recent Trends in Deep Learning Based Malware Detection
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise.
Umm-e-Hani Tayyab +4 more
semanticscholar +1 more source
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Comparison of Supervised Machine Learning Algorithms for Malware Detection
Due to the prevalence of security issues and cyberattacks, cybersecurity is crucial in today's environment. Malware has also evolved significantly over the past few years.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
Graph neural network‐based attack prediction for communication‐based train control systems
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao +3 more
wiley +1 more source
Cryptomining Malware Early Detection Method Based on AECD Embedding [PDF]
Cryptomining malware can compromise system security, reduce hardware lifetime, and cause significant power consumption. Therefore, implementing cryptomining malware early detection to stop its damage in time is critical to system security.
CAO Chuanbo, GUO Chun, LI Xianchao, SHEN Guowei
doaj +1 more source

