Results 81 to 90 of about 46,394 (182)
Malware: Detection and Defense
In today’s cyber security landscape, companies are facing increasing pressure to protect their data and systems from malicious attackers. As a result, there has been a significant rise in the number of security solutions that can identify malware. But how do you know if an image file is infected with malware? How can you prevent it from running?
openaire +3 more sources
Author Retains Full Rights [PDF]
Software and systems complexity can have a profound impact on information security. Such complexity is not only imposed by the imperative technical challenges of monitored heterogeneous and dynamic (IP and VLAN assignments) network infrastructures, but ...
Ad An +4 more
core
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley +1 more source
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core +1 more source
Workflow of the proposed hybrid BWO‐Transformer framework for stock price prediction. ABSTRACT Accurately predicting stock prices remains a major challenge in financial analytics due to the complexity and noise inherent in market data. Feature selection plays a critical role in improving both computational efficiency and predictive performance. In this
Amirhossein Malakouti Semnani +3 more
wiley +1 more source
Algor‐Ethics in Diabetes Care: Mapping the Route
ABSTRACT Diabetes mellitus represents a multifaceted global health challenge, frequently coexisting with obesity, cardiovascular complications, and metabolic disorders. Effective management requires individualised, evidence‐based decisions informed by an array of clinical, genetic, and lifestyle data.
Joshua Bemporad +2 more
wiley +1 more source
The Influence of Big Data‐Driven Educational Technologies on College Teaching Development
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley +1 more source
Malware Clustering Using Family Dependency Graph
Malware brings a major security threat on the Internet today. It is not surprising that much research has concentrated on detecting malware. Unfortunately, the current malware detection approaches suffer from ineffective detection of new malware samples.
Binlin Cheng +3 more
doaj +1 more source
From Static to AI-Driven Detection: A Comprehensive Review of Obfuscated Malware Techniques
The frequency of cyber attacks targeting individuals, businesses, and organizations globally has escalated in recent years. The evolution of obfuscated malware, designed to evade detection, has been unprecedented, employing new and sophisticated ...
Saranya Chandran +4 more
doaj +1 more source
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak +2 more
doaj +1 more source

