26   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Abigail Copiaco, Leena El Neel, Tasnim Nazzal, Husameldin Mukhtar and Walid Obaid    
This study introduces an innovative all-in-one malware identification model that significantly enhances convenience and resource efficiency in classifying malware across diverse file types. Traditional malware identification methods involve the extractio... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca    
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jeonggeun Jo, Jaeik Cho and Jongsub Moon    
Artificial intelligence (AI) is increasingly being utilized in cybersecurity, particularly for detecting malicious applications. However, the black-box nature of AI models presents a significant challenge. This lack of transparency makes it difficult to ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos    
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Sapna Sadhwani, Baranidharan Manibalan, Raja Muthalagu and Pranav Pawar    
The study in this paper characterizes lightweight IoT networks as being established by devices with few computer resources, such as reduced battery life, processing power, memory, and, more critically, minimal security and protection, which are easily vu... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Robert Bold, Haider Al-Khateeb and Nikolaos Ersotelos    
Technological achievement and cybercriminal methodology are two parallel growing paths; protocols such as Tor and i2p (designed to offer confidentiality and anonymity) are being utilised to run ransomware companies operating under a Ransomware as a Servi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ying-Dar Lin,Chun-Ying Huang     Pág. 157 - 165
Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious An... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Mahmoud M. El-Khouly,Samir Abou El-Seoud     Pág. pp. 139 - 145
Since cloud computing technology is growing day by day, it comes with many security problems, especially from threats such as malware. As more services migrate to the cloud architecture, the cloud will become a more appealing target for cyber criminals. ... ver más

 
en línea
Sereysethy Touch and Jean-Noël Colin    
To proactively defend computer systems against cyber-attacks, a honeypot system?purposely designed to be prone to attacks?is commonly used to detect attacks, discover new vulnerabilities, exploits or malware before they actually do real damage to real sy... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Huseyn Huseynov, Tarek Saadawi and Kenichi Kourai    
The extreme bandwidth and performance of 5G mobile networks changes the way we develop and utilize digital services. Within a few years, 5G will not only touch technology and applications, but dramatically change the economy, our society and individual l... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Vassilios Moussas and Antonios Andreatos    
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Boldizsár Bencsáth, Gábor Pék, Levente Buttyán and Márk Félegyházi    
Stuxnet was the first targeted malware that received worldwide attention for causing physical damage in an industrial infrastructure seemingly isolated from the online world. Stuxnet was a powerful targeted cyber-attack, and soon other malware samples we... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber    
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Hend Khalid Alkahtani, Khalid Mahmood, Majdi Khalid, Mahmoud Othman, Mesfer Al Duhayyim, Azza Elneil Osman, Amani A. Alneil and Abu Sarwar Zamani    
The fast development of the Internet of Things (IoT) and widespread utilization in a large number of areas, such as vehicle IoT, industrial control, healthcare, and smart homes, has made IoT security increasingly prominent. Ransomware is a type of malwar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula    
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh    
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Simon Nam Thanh Vu, Mads Stege, Peter Issam El-Habr, Jesper Bang and Nicola Dragoni    
Botnets, groups of malware-infected hosts controlled by malicious actors, have gained prominence in an era of pervasive computing and the Internet of Things. Botnets have shown a capacity to perform substantial damage through distributed denial-of-servic... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Pawel Dymora and Miroslaw Mazurek    
Fractal and multifractal analysis can help to discover the structure of the communication system, and in particular the pattern and characteristics of traffic, in order to understand the threats better and detect anomalies in network operation. The massi... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Smrithy G S,Ramadoss Balakrishnan     Pág. 225 - 232
The main objective of online anomaly detection is to identify abnormal/unusual behavior such as network intrusions, malware infections, over utilized system resources due to design defects etc from real time data stream. Terrabytes of performance data ge... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »