ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Technology
Computing
Computing
Social Sciences
Research
Education
Agronomy and forestry
Architecture and Urbanism
Biology
Pure sciences
all records (72)

Languages
English
Spanish
Portuguese

Countries
Indonesia
USA
Brazil
South Africa
Ukraine
Spain
Germany
Romania
Turkey, Turkish Republic
Canada
all records (64)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (24)

Filter  
 
2.297  Articles
1 of 231 pages  |  10  records  |  more records»
It has been well proved that malware attacks results in a loss of wealth and security to individuals andorganizations. So, it is of utmost importance to understand that how a person or an organization becomes avictim of malware attacks. To understand the ... see more

Abstract - The increase in the popularity of smartphones is followed by an increase in the number of users each year. In this case, smartphones with the Android platform are still ranked number one in the percentage of the highest number of users in the w... see more

In this paper, we propose a novel mechanism to normalise metamorphic and obfuscated malware down at the opcode level and hence create an advanced metamorphic malware de-obfuscation and defence system. We name this system as DRLDO, for deep reinforcement l... see more

The open source nature of Android Operating System has attracted wider adoption of the system by multiple types of developers. This phenomenon has further fostered an exponential proliferation of devices running the Android OS into different sectors of th... see more

Nowadays, the rapid evolution in the mobile phone industry has attracted lots of consumers around the world while smartphones being the trend of the phone with the highest demand by a large margin. Recent research has shown that Android Operating System h... see more

A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization’s security posture on an ongoing basis. The SOC staff works closely with incident response teams, se... see more

Ransomware is a dangerous malware that blocks access to data through encryption, and it exploits device vulnerabilities to perform chain attacks from one system to another. This study results in modeling the threat of ransomware attacks using Bayesian Net... see more

Internet of Things is an emerging technology in the modern world and its network is expanding constantly. Meanwhile, IoT devices are a soft target and vulnerable to attackers. The battle between malware attackers and security analysts is persistent and ev... see more

The number of client-side attacks is increasing day-by-day. These attacks are launched by using various methods like phishing, drive-by downloads, click-frauds, social engineering, scareware, and ransomware. To get more advantage with less exertion and ti... see more

1 of 231 pages  |  10  records  |  more records»