Results 61 to 70 of about 21,539 (179)

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

The dynamics of criminal collaboration: Multiplex ties in mafia networks

open access: yesCriminology, EarlyView.
Abstract This study examines how social embeddedness and multiplex relationships shape criminal collaboration within organized crime networks. Drawing on data from three major investigations into the ‘Ndrangheta, we analyze how kinship, clan affiliation, leadership, and prior interactions influence participation in meetings and phone calls.
Francesco Calderoni   +2 more
wiley   +1 more source

Android Ransomware Detection From Traffic Analysis Using Metaheuristic Feature Selection

open access: yesIEEE Access, 2022
Among the prevalent cyberattacks on Android devices, a ransomware attack is the most common and damaging. Although there are many solutions for detecting Android ransomware attacks, existing solutions have limited detection accuracy and high ...
Md. Sakir Hossain   +7 more
doaj   +1 more source

Tales of Cyberspace and Artificial Intelligence: Diverging Stakeholderships?

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article traces the evolution of the Internet from the 1990s to the 2020s and compares it with the development of Artificial Intelligence (AI), particularly following the public launch of ChatGPT in late 2022. It identifies both parallels and divergencies between these two overlapping technological domains, focusing on the growing ...
Johan Eriksson, Giampiero Giacomello
wiley   +1 more source

Dynamics of Targeted Ransomware Negotiation

open access: yesIEEE Access, 2022
In this paper, we consider how the development of targeted ransomware has affected the dynamics of ransomware negotiations to better understand how to respond to ransomware attacks.
Pierce Ryan   +3 more
doaj   +1 more source

Resilient IT: Winning With People and Process

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT In today's dynamic environment, IT organisations face numerous challenges from disruptions such as natural disasters, cybersecurity threats, international conflicts, evolving regulations, pandemics and recent global incidents such as the CrowdStrike outage.
Wesam Helou   +2 more
wiley   +1 more source

Elastic Shifts: I/O Sequence Patterns of Ransomware and Detection Evasion

open access: yesIEEE Access
Cyber-criminals frequently use crypto-ransomware to gain financial benefit by encrypting victims’ valuable digital assets, such as photos and documents.
Il Hyeon Ju, Huy Kang Kim
doaj   +1 more source

R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections

open access: yes, 2018
The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid ...
Huang, TonTon Hsien-De, Kao, Hung-Yu
core   +1 more source

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, EarlyView.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

When Business Breaks the Rules: The Value of a Criminology‐Informed “Organizational” Perspective for the Regulation of White‐Collar and Corporate Crimes

open access: yesRegulation &Governance, EarlyView.
ABSTRACT This article argues that if the aspiration is to enhance regulatory and governance responses to white‐collar and corporate crimes, consideration of the organization of these offending behaviors must be central to the scholarly, practice, and policy discussion.
Nicholas Lord, Michael Levi
wiley   +1 more source

Home - About - Disclaimer - Privacy