Results 41 to 50 of about 36,905 (167)

Sec-Lib: Protecting Scholarly Digital Libraries From Infected Papers Using Active Machine Learning Framework

open access: yesIEEE Access, 2019
Researchers from academia and the corporate-sector rely on scholarly digital libraries to access articles. Attackers take advantage of innocent users who consider the articles' files safe and thus open PDF-files with little concern.
Nir Nissim   +6 more
doaj   +1 more source

An Improved Method of Detecting Macro Malware on an Imbalanced Dataset

open access: yesIEEE Access, 2020
In spear-phishing attacks, macro malware written in VBA (Visual Basic for Applications) is often used to compromise the target computers. Macro malware is often obfuscated in several ways to evade detection.
Mamoru Mimura
doaj   +1 more source

PAIRED: An Explainable Lightweight Android Malware Detection System

open access: yesIEEE Access, 2022
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
Mohammed M. Alani, Ali Ismail Awad
doaj   +1 more source

A Multi-view Context-aware Approach to Android Malware Detection and Malicious Code Localization

open access: yes, 2017
Existing Android malware detection approaches use a variety of features such as security sensitive APIs, system calls, control-flow structures and information flows in conjunction with Machine Learning classifiers to achieve accurate detection.
Chandramohan, Mahinthan   +3 more
core   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

A Neural Network-Based Approach for Cryptographic Function Detection in Malware

open access: yesIEEE Access, 2020
Cryptographic technology has been commonly used in malware for hiding their static characteristics and malicious behaviors to avoid the detection of anti-virus engines and counter the reverse analysis from security researchers.
Li Jia   +5 more
doaj   +1 more source

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

open access: yes, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +1 more source

A Systems‐Level Approach to Address Risks and Ethics in Artificial Intelligence Systems

open access: yesSystems Engineering, EarlyView.
ABSTRACT Artificial intelligence (AI) is rapidly changing the world, from completely controlling routine or mundane tasks like text and image generation, to powering advanced algorithms that control critical systems. The recent advances in generative AI quickly overwhelmed multiple industries from education to finance as first adopters rushed (and ...
Vincent P. Paglioni, Torrey Mortenson
wiley   +1 more source

DQN‐Guided Subset‐Induced OCSVM Kernel Approximation for Imbalanced Anomaly Detection

open access: yesIEEJ Transactions on Electrical and Electronic Engineering, EarlyView.
Anomaly detection under limited normal data remains a fundamental challenge due to severe class imbalance and scarcity of anomalies. We propose a novel framework that reformulates support vector selection in One‐Class SVM as a sequential decision‐making problem.
Wenqian Yu, Jiaying Wu, Jinglu Hu
wiley   +1 more source

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

open access: yes, 2019
Malware still constitutes a major threat in the cybersecurity landscape, also due to the widespread use of infection vectors such as documents. These infection vectors hide embedded malicious code to the victim users, facilitating the use of social ...
Biggio, Battista   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy