Results 71 to 80 of about 10,938 (187)
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
RMDNet-Deep Learning Paradigms for Effective Malware Detection and Classification
Malware analysis and detection are still essential for maintaining the security of networks and computer systems, even as the threat landscape shifts.
S. Puneeth +3 more
doaj +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Malware detection and classification methods are being actively developed to protect personal information from hackers. Global images of malware (in a program that includes personal information) can be utilized to detect or classify it.
Sejun Jang, Shuyu Li, Yunsick Sung
doaj +1 more source
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
Proposed cyber physical system security framework. ABSTRACT The increasing adoption of cyber‐physical systems (CPS) in Industry 4.0 has heightened vulnerability to cyber threats. This study proposes a machine learning–based intrusion detection framework, DBID‐Net, to effectively identify and prevent attacks in CPS environments. The framework integrates
Anurag Sinha +14 more
wiley +1 more source
Efficient Malware Classification using Transfer Learning and Stacked Ensemble Techniques [PDF]
The exponential growth of internet usage and communication devices has led to heightened security vulnerabilities, including the proliferation of malware such as viruses, ransomware, trojans, and spyware. These increasingly sophisticated malware variants
Krishna Kumar +2 more
doaj +1 more source
Explainable AI With Imbalanced Learning Strategies for Blockchain Transaction Fraud Detection
Research methodology pipeline for blockchain fraud detection. ABSTRACT Blockchain networks now support billions of dollars in daily transactions, making reliable and transparent fraud detection essential for maintaining user trust and financial stability.
Ahmed Abbas Jasim Al‐Hchaimi +2 more
wiley +1 more source
GRASE: Granulometry Analysis With Semi Eager Classifier to Detect Malware.
Technological advancement in communication leading to 5G, motivates everyone to get connected to the internet including ‘Devices’, a technology named Web of Things (WoT).
Mahendra Deore +3 more
doaj +1 more source
Robust Intelligent Malware Detection Using Deep Learning
Security breaches due to attacks by malicious software (malware) continue to escalate posing a major security concern in this digital age. With many computer users, corporations, and governments affected due to an exponential growth in malware attacks ...
R. Vinayakumar +4 more
doaj +1 more source

