ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Computing
Technology
Industrial engineer
Communication
Research
Architecture and Urbanism
Electrical and electronic
Law
Pure sciences
all records (40)

Languages
English
Spanish
Portuguese

Countries
Indonesia
USA
Turkey, Turkish Republic
Brazil
Canada
Croatia
India
Switzerland
Iraq
Malaysia
all records (23)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (14)

Filter  
 
156  Articles
1 of 17 pages  |  10  records  |  more records»
Now days Email is the most important aplplication  on the internet, this make email one of the industry’s most targeted sector for commiting cyber crimes. Email phishing and spam not only harm many parties but also consumes a lot of network bandwidth... see more

Handling imbalanced dataset has their own challenge. Inappropriate step during the pre-processing phase with imbalanced data could bring the negative effect on prediction result. The accuracy score seems high, but actually there are many problems on recal... see more

In today's world that called technology age, smartphones have become indispensable for users in many areas such as internet usage, social media usage, bank transactions, e-mail, as well as communication. The Android operating system is the most popular op... see more

Purpose: Malicious software or malware is a real threat to the security of computer systems or networks. Researchers made various attempts to find information and knowledge about malware, including preventing or even eliminating it. One effort to detect i... see more

Abstract - The increase in the popularity of smartphones is followed by an increase in the number of users each year. In this case, smartphones with the Android platform are still ranked number one in the percentage of the highest number of users in the w... see more

In this paper, we propose a novel mechanism to normalise metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defence system. We name this system as DRLDO, for deep reinforcement l... see more

Android operating system has become very popular, with the highest market share, amongst all other mobile operating systems due to its open source nature and users friendliness. This has brought about an uncontrolled rise in malicious applications targeti... see more

Control flow graphs (CFG) and OpCodes extracted from disassembled executable files are widely used for malware detection. Most of the research in static analysis is focused on binary class malware detection which only classifies an executable as benign or... see more

Due to the weak policy of submitting application to Google Play store, attackers developed malware to attack the users of the Android operating system with malware application or by including malicious code into applications. Researchers have been done in... see more

1 of 17 pages  |  10  records  |  more records»