Results 51 to 60 of about 46,889 (202)
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Comparison of Supervised Machine Learning Algorithms for Malware Detection
Due to the prevalence of security issues and cyberattacks, cybersecurity is crucial in today's environment. Malware has also evolved significantly over the past few years.
Mohd Faris Mohd Fuzi +3 more
doaj +1 more source
ABSTRACT This article contributes to sustainability research by investigating the complex, geopolitically induced challenges faced by industrial supply chains under international sanctions. Using Iran's steel industry as a case, it examines sustainability barriers through the lens of stakeholder theory. A mixed methods approach was employed.
Seyed Hamed Moosavirad +2 more
wiley +1 more source
Trends in Android Malware Detection
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and
Kaveh Shaerpour +2 more
openaire +3 more sources
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Cryptomining Malware Early Detection Method Based on AECD Embedding [PDF]
Cryptomining malware can compromise system security, reduce hardware lifetime, and cause significant power consumption. Therefore, implementing cryptomining malware early detection to stop its damage in time is critical to system security.
CAO Chuanbo, GUO Chun, LI Xianchao, SHEN Guowei
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
Windows Malware Detection Under the Machine Learning Models and Neutrosophic Numbers [PDF]
Significant cybersecurity risks are posed by malware assaults on Windows computers, which call for efficient detection and prevention systems.
Alber S. Aziz +5 more
doaj +1 more source
Enhanced Metamorphic Techniques-A Case Study Against Havex Malware
Most of the commercial antiviruses are signature based, that is, they use existing database signature to detect the malware. Malware authors use code obfuscation techniques in their variety of malware with the aim of bypassing detection by antiviruses ...
Zainub Mumtaz +4 more
doaj +1 more source
DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley +1 more source

