Results 71 to 80 of about 4,236,332 (208)

Windows PE Malware Detection Using Ensemble Learning

open access: yesInformatics, 2021
In this Internet age, there are increasingly many threats to the security and safety of users daily. One of such threats is malicious software otherwise known as malware (ransomware, Trojans, viruses, etc.).
N. Azeez   +4 more
semanticscholar   +1 more source

A Hybrid Framework for Stock Price Forecasting Using Metaheuristic Feature Selection Approaches and Transformer Models Enhanced by Temporal Embedding and Attention Pruning

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani   +3 more
wiley   +1 more source

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

A Machine Learning Framework for Detecting and Preventing Cyber‐Attacks in Industrial Cyber‐Physical Systems

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha   +14 more
wiley   +1 more source

Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework

open access: yesIEEE Access
The cyber realm is overwhelmed with dynamic malware that promptly penetrates all defense mechanisms, operates unapprehended to the user, and covertly causes damage to sensitive data.
Faiza Babar Khan   +5 more
doaj   +1 more source

TTGNet-AMD: Android malware detection based on multi-modal feature fusion [PDF]

open access: yesPeerJ Computer Science
The application of static features for Android malware detection has been extensively studied and developed. Existing methods exhibit limitations in both the completeness and discriminability of feature representation, which affects the enhancement of ...
Jiayin Feng   +5 more
doaj   +2 more sources

Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi   +2 more
wiley   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Malware traffic detection based on type II fuzzy recognition

open access: yesFrontiers in Physics
In recent years, a surge in malicious network incidents and instances of network information theft has taken place, with malware identified as the primary culprit.
Weisha Zhang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy