Results 51 to 60 of about 4,236,332 (208)

On the Effectiveness of Perturbations in Generating Evasive Malware Variants

open access: yesIEEE Access, 2023
Malware variants are generated using various evasion techniques to bypass malware detectors, so it is important to understand what properties make them evade malware detection techniques.
Beomjin Jin   +3 more
doaj   +1 more source

Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

open access: yesApplied Sciences, 2022
As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware.
Abimbola G. Akintola   +9 more
doaj   +1 more source

A Malware Detection Approach Using Autoencoder in Deep Learning

open access: yesIEEE Access, 2022
Today, in the field of malware detection, the expanding limitations of traditional detection methods and the increasing accuracy of detection methods designed on the basis of artificial intelligence algorithms are driving research findings in this area ...
Xiaofei Xing   +4 more
semanticscholar   +1 more source

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System

open access: yesIEEE Access, 2018
For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad   +5 more
doaj   +1 more source

A Survey of the Recent Trends in Deep Learning Based Malware Detection

open access: yesJournal of Cybersecurity and Privacy, 2022
Monitoring Indicators of Compromise (IOC) leads to malware detection for identifying malicious activity. Malicious activities potentially lead to a system breach or data compromise.
Umm-e-Hani Tayyab   +4 more
semanticscholar   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, EarlyView.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Comparison of Supervised Machine Learning Algorithms for Malware Detection

open access: yesJournal of Computing Research and Innovation, 2023
Due to the prevalence of security issues and cyberattacks, cybersecurity is crucial in today's environment. Malware has also evolved significantly over the past few years.
Mohd Faris Mohd Fuzi   +3 more
doaj   +1 more source

Graph neural network‐based attack prediction for communication‐based train control systems

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Advanced Persistent Threats (APTs) have emerged as one of the key security challenges to industrial control systems. APTs are complex multi‐step attacks, and they are naturally diverse and complex. Therefore, it is important to comprehend the behaviour of APT attackers and anticipate the upcoming attack actions.
Junyi Zhao   +3 more
wiley   +1 more source

Cryptomining Malware Early Detection Method Based on AECD Embedding [PDF]

open access: yesJisuanji kexue yu tansuo
Cryptomining malware can compromise system security, reduce hardware lifetime, and cause significant power consumption. Therefore, implementing cryptomining malware early detection to stop its damage in time is critical to system security.
CAO Chuanbo, GUO Chun, LI Xianchao, SHEN Guowei
doaj   +1 more source

Home - About - Disclaimer - Privacy