A novel technique for ransomware detection using image based dynamic features and transfer learning to address dataset limitations. [PDF]
Ferdous J +3 more
europepmc +1 more source
Spyware vs. Spyware: Software Conflicts and User Autonomy [PDF]
Grimmelmann, James
core +1 more source
Ransomware attacks -- in contrast to other cyber attacks -- must not be detected and especially not blocked or recovered on first sight. This relaxation is supported by the rareness of ransomware attacks. Certainly, the uprising of ransomware families, which are able to circumvent the detection mechanism, integrated into the local machine, prevents the
openaire +1 more source
Football cybersecurity threat severity prediction using multi-head transformer-based deep learning models. [PDF]
Hassan BM +5 more
europepmc +1 more source
Cybersecurity as it relates to perfusion. [PDF]
Lung K.
europepmc +1 more source
During the first months of 2020, the evolution and importance of the resources proposed by the Digital Society has been showed for the implementation of the concept of "Business Continuity", for teleworking in organizations and also for the establishment of new forms of communication between people.
openaire +1 more source
Cybersecurity in connected medical devices: a policy agenda for the NHS. [PDF]
Toparti O, Rajput K, Darzi A, Ghafur S.
europepmc +1 more source
Systematic Evaluation of Machine Learning and Deep Learning Models for IoT Malware Detection Across Ransomware, Rootkit, Spyware, Trojan, Botnet, Worm, Virus, and Keylogger. [PDF]
Maghanaki M +3 more
europepmc +1 more source
A generative AI-driven cybersecurity framework for small and medium enterprises software development: an ANN-ISM approach. [PDF]
Awan M +5 more
europepmc +1 more source

