Results 61 to 70 of about 31,732 (193)

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

Android malware detection using random forest algorithm

open access: yesProceedings of the Nigerian Society of Physical Sciences
The proliferation of mobile devices and their dependence on the android OS has made them prime targets for cybercriminals, leading to an escalating threat of malware.
Samson Isaac   +4 more
doaj   +1 more source

PoPL: Proof-of-Presence and Locality, or How to Secure Financial Transactions on Your Smartphone

open access: yesIEEE Access, 2021
The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures. Strong cryptography and trusted on-chip hardware modules are powerless against sophisticated attacks
Yonas Leguesse   +3 more
doaj   +1 more source

Android Malware Clustering through Malicious Payload Mining

open access: yes, 2017
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos   +7 more
core   +1 more source

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

GA-StackingMD: Android Malware Detection Method Based on Genetic Algorithm Optimized Stacking

open access: yesApplied Sciences, 2023
With the rapid development of network and mobile communication, intelligent terminals such as smartphones and tablet computers have changed people’s daily life and work.
Nannan Xie, Zhaowei Qin, Xiaoqiang Di
doaj   +1 more source

A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed   +4 more
wiley   +1 more source

A Comprehensive Review on Malware Detection Approaches

open access: yesIEEE Access, 2020
According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques.
Omer Aslan, Refik Samet
doaj   +1 more source

Blockchain in Communication Networks: A Comprehensive Review

open access: yesIET Blockchain, Volume 6, Issue 1, January/December 2026.
This article provides a comprehensive review of blockchain applications in communication networks, focusing on domains such as IoT, 5G, vehicular systems, and decentralised trust infrastructures. It examines key challenges—including scalability, interoperability, and latency—and outlines future directions such as lightweight consensus protocols and AI ...
Quazi Mamun, Zhenni Pan, Jun Wu
wiley   +1 more source

A family of droids -- Android malware detection via behavioral modeling: static vs dynamic analysis [PDF]

open access: yes, 2019
Following the increasing popularity of mobile ecosystems, cybercriminals have increasingly targeted them, designing and distributing malicious apps that steal information or cause harm to the device's owner.
Almeida, Mario   +5 more
core  

Home - About - Disclaimer - Privacy