9   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo    
Recognition of malware is critical in cybersecurity as it allows for avoiding execution and the downloading of malware. One of the possible approaches is to analyze the executable?s Application Programming Interface (API) calls, which can be done using t... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Mohammed N. AlJarrah, Qussai M. Yaseen and Ahmad M. Mustafa    
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike man... ver más
Revista: Information    Formato: Electrónico

 
en línea
Linda Joseph,Rajeswari Mukesh     Pág. 249 - 257
Cloud Computing strives to be dynamic as a service oriented architecture. The services in the SoA are rendered in terms of private, public and in many other commercial domain aspects. These services should be secured and thus are very vital to the cloud ... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca    
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ammar Yahya Daeef, Ali Al-Naji, Ali K. Nahar and Javaan Chahl    
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for businesses to exclude malware from their computer systems. The most responsive solution to this issue would operate in real time at the edge of the IT system... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuxin Zhang, Shumian Yang, Lijuan Xu, Xin Li and Dawei Zhao    
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown to be effective ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ding Yourun,Dmitry E. Gouriev     Pág. 91 - 94
The MDIO interface is used in conjunction with the Ethernet MAC-PHY interfaces MII, RMII, SMII, GMII, RGMII, SGMII and provides an access to the internal registers of the Ethernet transceiver (which is also known as the Ethernet PHY). The only Linux oper... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Andrei Chi?     Pág. 1 - 18
This article reports on the Design Science engineering cycle for implementing a modeling method to support model-driven, process-centric API management. The BPMN standard was hereby enriched on semantic, syntactic and tool levels in order to provide a vi... ver más
Revista: Complex Systems Informatics and Modeling Quarterly    Formato: Electrónico

 
en línea
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis    
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »