Works matching DE "MALWARE"
Results: 2045
Imbalance Datasets in Malware Detection: A Review of Current Solutions and Future Directions.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1323
- By:
- Publication type:
- Article
Exploring Machine Learning in Malware Analysis: Current Trends and Future Perspectives.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1256
- By:
- Publication type:
- Article
Comparison of Machine Learning Algorithms for Malware Detection Using EDGE-IIoTSET Dataset in IoT.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1225
- By:
- Publication type:
- Article
Android Malware Detection Through CNN Ensemble Learning on Grayscale Images.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 1208
- By:
- Publication type:
- Article
Analyzing Disk-Minimal Malware in Phishing Attacks: A Forensic Methodology for Modern Cyber Threats.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 82
- By:
- Publication type:
- Article
An adaptive neuro-fuzzy inference system for multinomial malware classification.
- Published in:
- Journal of Nigerian Society of Physical Sciences, 2025, v. 7, n. 1, p. 1, doi. 10.46481/jnsps.2025.2172
- By:
- Publication type:
- Article
SCADvanceXP--an intelligent Polish system for threat detection and monitoring of industrial networks.
- Published in:
- Security & Defence Quarterly, 2024, v. 48, n. 4, p. 19, doi. 10.35467/sdq/177655
- By:
- Publication type:
- Article
Machine learning-based malware detection system for securing android-based internet of vehicles.
- Published in:
- Mathematics in Engineering, Science & Aerospace (MESA), 2024, v. 15, n. 4, p. 1347
- By:
- Publication type:
- Article
Improvement of Lee-Hwang-Yang's Blind Signature Scheme.
- Published in:
- Journal of Systems Science & Information, 2011, v. 9, n. 3, p. 201
- By:
- Publication type:
- Article
ILOVEYOU: Viruses, paranoia, and the environment of risk.
- Published in:
- Sociological Review, 2000, v. 48, n. 2, p. 17, doi. 10.1111/j.1467-954X.2000.tb03518.x
- By:
- Publication type:
- Article
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks.
- Published in:
- Journal of Information Science & Engineering, 2022, v. 38, n. 6, p. 1189, doi. 10.6688/JISE.202211_38(6).0006
- By:
- Publication type:
- Article
Efficient Automatic Original Entry Point Detection.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 4, p. 887, doi. 10.6688/JISE.201907_35(4).0011
- By:
- Publication type:
- Article
IMBF - Counteracting Denial-of-Sleep Attacks in 6LowPAN Based Internet of Things.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 2, p. 361, doi. 10.6688/J1SE.201903_35(2).0007
- By:
- Publication type:
- Article
Real-time Auditing of the Runtime Environment for Cloud Computing Platforms.
- Published in:
- Journal of Information Science & Engineering, 2019, v. 35, n. 2, p. 323, doi. 10.6688/JISE.201903_35(2).0005
- By:
- Publication type:
- Article
Fairness Guaranteed Rating Decomposition in Service-oriented Reputation Systems.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1079, doi. 10.6688/JISE.201807_34(4).0017
- By:
- Publication type:
- Article
2-OptACO: An Improvement of Ant Colony Optimization for UAV Path in Disaster Rescue.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1063, doi. 10.6688/JISE.201807_34(4).0016
- By:
- Publication type:
- Article
Hierarchical CSI-Fingerprint Classification for Passive Multiperson Localization.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1047, doi. 10.6688/JISE.201807_34(4).0015
- By:
- Publication type:
- Article
EPEE 3.0: A Unified Host-FPGA Communication Library Framework for SDR Platforms.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1031, doi. 10.6688/JISE.201807_34(4).0014
- By:
- Publication type:
- Article
End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1015, doi. 10.6688/JISE.201807_34(4).0013
- By:
- Publication type:
- Article
SKCFS: Stochastic Optimal Forwarding Strategy for Knowledge Centric Network.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 1001, doi. 10.6688/JISE.201807_34(4).0012
- By:
- Publication type:
- Article
Efficient Denial of Service Attacks Detection in Wireless Sensor Networks.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 977, doi. 10.6688/JISE.201807_34(4).0011
- By:
- Publication type:
- Article
Jensen-Shannon Divergence Based Secure Authentication Method on Smart Phones.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 961, doi. 10.6688/JISE.201807_34(4).0010
- By:
- Publication type:
- Article
PVad: Privacy-Preserving Verification for Secure Routing in Ad Hoc Networks.
- Published in:
- Journal of Information Science & Engineering, 2018, v. 34, n. 4, p. 943, doi. 10.6688/JISE.201807_34(4).0009
- By:
- Publication type:
- Article
A Robust Electronic Voting Scheme Against Side Channel Attack.
- Published in:
- Journal of Information Science & Engineering, 2016, v. 32, n. 6, p. 1471
- By:
- Publication type:
- Article
SWIFT: Decoupled System-Wide Information Flow Tracking and its Optimizations.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 4, p. 1413
- By:
- Publication type:
- Article
Feature Selection and Extraction for Malware Classification.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 3, p. 965
- By:
- Publication type:
- Article
MrKIP: Rootkit Recognition With Kernel Function Invocation Pattern.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 2, p. 455
- By:
- Publication type:
- Article
DROIT: Dynamic Alternation of Dual-Level Tainting for Malware Analysis.
- Published in:
- Journal of Information Science & Engineering, 2015, v. 31, n. 1, p. 111
- By:
- Publication type:
- Article
Interactive Website Filter for Safe Web Browsing.
- Published in:
- Journal of Information Science & Engineering, 2013, v. 29, n. 1, p. 115
- By:
- Publication type:
- Article
A Secure ID-Based Authenticated Group Key Exchange Protocol Resistant to Insider Attacks.
- Published in:
- Journal of Information Science & Engineering, 2011, v. 27, n. 3, p. 915
- By:
- Publication type:
- Article
USO DE MALWARE EM INVESTIGAÇÃO CRIMINAL.
- Published in:
- Actualidad Jurídica (1578-956X), 2017, n. 47, p. 19
- By:
- Publication type:
- Article
A model-driven approach for vulnerability evaluation of modern physical protection systems.
- Published in:
- Software & Systems Modeling, 2019, v. 18, n. 1, p. 523, doi. 10.1007/s10270-016-0572-7
- By:
- Publication type:
- Article
Malware detection for container runtime based on virtual machine introspection.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 6, p. 7245, doi. 10.1007/s11227-023-05727-w
- By:
- Publication type:
- Article
A novel malware detection method based on API embedding and API parameters.
- Published in:
- Journal of Supercomputing, 2024, v. 80, n. 2, p. 2748, doi. 10.1007/s11227-023-05556-x
- By:
- Publication type:
- Article
BejaGNN: behavior-based Java malware detection via graph neural network.
- Published in:
- Journal of Supercomputing, 2023, v. 79, n. 14, p. 15390, doi. 10.1007/s11227-023-05243-x
- By:
- Publication type:
- Article
Intelligent malware detection based on graph convolutional network.
- Published in:
- Journal of Supercomputing, 2022, v. 78, n. 3, p. 4182, doi. 10.1007/s11227-021-04020-y
- By:
- Publication type:
- Article
Leakage-resilient coin tossing.
- Published in:
- Distributed Computing, 2014, v. 27, n. 3, p. 147, doi. 10.1007/s00446-013-0206-z
- By:
- Publication type:
- Article
Multi-Level Fusion for Enhanced Host-based Malware Detection in ICT-Enabled Smart Cities.
- Published in:
- Fusion: Practice & Applications, 2024, v. 15, n. 2, p. 221, doi. 10.54216/FPA.150220
- By:
- Publication type:
- Article
Detecting Zero-day Polymorphic Worms Using Honeywall.
- Published in:
- Journal of Cybersecurity & Information Management, 2025, v. 15, n. 1, p. 34, doi. 10.54216/JCIM.150104
- By:
- Publication type:
- Article
Detection and Classification of Malware Using Guided Whale Optimization Algorithm for Voting Ensemble.
- Published in:
- Journal of Cybersecurity & Information Management, 2022, v. 10, n. 1, p. 34, doi. 10.54216/JCIM.100102
- By:
- Publication type:
- Article
Re-Evaluating the Necessity of Third-Party Antivirus Software on Windows Operating System.
- Published in:
- Journal of Cybersecurity & Information Management, 2022, v. 10, n. 1, p. 18, doi. 10.54216/JCIM.090105
- By:
- Publication type:
- Article
A Heuristic Procedure to Optimize the Design of a Permeable Reactive Barrier for In Situ Groundwater Remediation.
- Published in:
- Adsorption Science & Technology, 2014, v. 32, n. 2/3, p. 125, doi. 10.1260/0263-6174.32.2-3.125
- By:
- Publication type:
- Article
Artificial Intelligence in Terms of Spotting Malware and Delivering Cyber Risk Management.
- Published in:
- Journal of Positive School Psychology, 2022, v. 6, n. 3, p. 6156
- By:
- Publication type:
- Article
Analyzing the Cyber Threat Information to Consolidate the Security Posture of an Application.
- Published in:
- Journal of Positive School Psychology, 2022, v. 6, n. 2, p. 2783
- By:
- Publication type:
- Article
Localized State-Change Consensus in Immense and Highly Dynamic Environments.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 2, p. 1, doi. 10.3390/cryptography6020023
- By:
- Publication type:
- Article
The IMPACT of COVID-19 on CYBERCRIME AND CYBERTHREATS.
- Published in:
- European Law Enforcement Research Bulletin, 2021, p. 1
- By:
- Publication type:
- Article
HISTORICAL DEVELOPMENT OF CYBERSECURITY STUDIES: A LITERATURE REVIEW AND ITS PLACE IN SECURITY STUDIES.
- Published in:
- Strategic Review / Przeglad Strategiczny, 2022, v. 12, n. 15, p. 393, doi. 10.14746/ps.2022.1.23
- By:
- Publication type:
- Article
The SEIRS-NIMFA epidemiological model for malware propagation analysis in IoT networks: The SEIRS-NIMFA epidemiological...: L. Quiroga-Sánchez et al.
- Published in:
- Cybersecurity (2523-3246), 2025, v. 8, n. 1, p. 1, doi. 10.1186/s42400-024-00310-z
- By:
- Publication type:
- Article
Mi-maml: classifying few-shot advanced malware using multi-improved model-agnostic meta-learning.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00314-9
- By:
- Publication type:
- Article
Enhanced detection of obfuscated malware in memory dumps: a machine learning approach for advanced cybersecurity.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00205-z
- By:
- Publication type:
- Article