Results 81 to 90 of about 46,394 (182)

Malware: Detection and Defense

open access: yes, 2023
In today’s cyber security landscape, companies are facing increasing pressure to protect their data and systems from malicious attackers. As a result, there has been a significant rise in the number of security solutions that can identify malware. But how do you know if an image file is infected with malware? How can you prevent it from running?
openaire   +3 more sources

Author Retains Full Rights [PDF]

open access: yes
Software and systems complexity can have a profound impact on information security. Such complexity is not only imposed by the imperative technical challenges of monitored heterogeneous and dynamic (IP and VLAN assignments) network infrastructures, but ...
Ad An   +4 more
core  

Information systems and digitization of traditional knowledge: Trends in cultural heritage and memory institutions and the WIPO Genetic Resources Treaty*

open access: yesThe Journal of World Intellectual Property, Volume 29, Issue 1, Page 130-161, March 2026.
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley   +1 more source

Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]

open access: yes, 2019
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core   +1 more source

A Hybrid Framework for Stock Price Forecasting Using Metaheuristic Feature Selection Approaches and Transformer Models Enhanced by Temporal Embedding and Attention Pruning

open access: yesApplied AI Letters, Volume 7, Issue 1, February 2026.
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani   +3 more
wiley   +1 more source

Algor‐Ethics in Diabetes Care: Mapping the Route

open access: yesDiabetes/Metabolism Research and Reviews, Volume 42, Issue 2, February 2026.
ABSTRACT Diabetes mellitus represents a multifaceted global health challenge, frequently coexisting with obesity, cardiovascular complications, and metabolic disorders. Effective management requires individualised, evidence‐based decisions informed by an array of clinical, genetic, and lifestyle data.
Joshua Bemporad   +2 more
wiley   +1 more source

The Influence of Big Data‐Driven Educational Technologies on College Teaching Development

open access: yesEngineering Reports, Volume 8, Issue 2, February 2026.
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley   +1 more source

Malware Clustering Using Family Dependency Graph

open access: yesIEEE Access, 2019
Malware brings a major security threat on the Internet today. It is not surprising that much research has concentrated on detecting malware. Unfortunately, the current malware detection approaches suffer from ineffective detection of new malware samples.
Binlin Cheng   +3 more
doaj   +1 more source

From Static to AI-Driven Detection: A Comprehensive Review of Obfuscated Malware Techniques

open access: yesIEEE Access
The frequency of cyber attacks targeting individuals, businesses, and organizations globally has escalated in recent years. The evolution of obfuscated malware, designed to evade detection, has been unprecedented, employing new and sophisticated ...
Saranya Chandran   +4 more
doaj   +1 more source

Static analysis framework for permission-based dataset generation and android malware detection using machine learning

open access: yesEURASIP Journal on Information Security
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy