-
121
Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet
Published 2024-12-01“…Steganography conceals data within digital media, but its misuse for cyberattacks—such as embedding malware—has highlighted the need for steganalysis, the detection of hidden data. …”
Get full text
Article -
122
MSSA: multi-stage semantic-aware neural network for binary code similarity detection
Published 2025-01-01“…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
Get full text
Article -
123
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. Girls are often the primary targets of these various forms of cybercrime. …”
Get full text
Article -
124
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.…”
Get full text
Article -
125
Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms
Published 2025-01-01“…By analyzing case studies such as Android Automotive, Message Queuing Telemetry Transport (MQTT), and the Robot Operating System (ROS), we identify the primary security threats, including malware attacks, data manipulation, and Denial of Service (DoS) attacks. …”
Get full text
Article -
126
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01“…There were identified changes in malware-as-a-service and ransomware-as-a-service attacks, as well as changes in cybercriminal tactics and methods to orchestrate an attack. …”
Get full text
Article -
127
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
Get full text
Article -
128
Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, Threats, and Future Directions
Published 2025-01-01“…The findings underscore the widespread vulnerabilities across the IIoT architecture, particularly in relation to DoS, ransomware, malware, and MITM attacks. The review emphasizes the integration of advanced security technologies, including machine learning (ML), federated learning (FL), blockchain, blockchain–ML, deep learning (DL), encryption, cryptography, IT/OT convergence, and digital twins, as essential for enhancing the security and real-time data protection of CPS in IIoT–edge computing. …”
Get full text
Article -
129
Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications
Published 2025-01-01“…Distributed Denial of Service (DDoS) attacks, malware infections, and communication abnormalities increase cybersecurity dangers to these networks, threatening operational safety and efficiency. …”
Get full text
Article -
130
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01“…The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (e.g., phishing, malware, APTs) and non-game-based (e.g., social engineering, compliance issues) threats. …”
Get full text
Article -
131
Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection
Published 2025-01-01“…When calculating the reward in reinforcement learning, we used the comparison value with the pre-trained Seq2Seq model, the malware log sequence detected by the rule set based on reinforcement learning, and the false positive value generated by the normal data to create its own rule set. …”
Get full text
Article -
132
Trends, challenges and solutions of digital information security in Central and Eastern Europe
Published 2024-06-01“…Establishing a secure remote work environment remains a top priority, along with the ongoing fight against malicious malware attacks. It was determined that the use of cloud technologies remains particularly relevant for international companies and CEE institutions. …”
Get full text
Article -
133
Research on cloud-based traffic adaptive command and control method for mobile botnet
Published 2014-11-01“…Botnet is a serious attack evolved from traditional malwares.With the rapid development of computing capability and mobile Internet access technology,building a realistic mobile botnet has become a potential threat.An adaptive traffic control mechanism for cloud-based mobile botnet was proposed.It adopts different traffic consumption strategies according to different 3G or Wi-Fi network environments.Then scheduling algorithms to execute botnet commands was applied.The experimental results show the traffic adaptive algorithm can improve the stealthy and efficiency of mobile botnet while ensure that the botnet commands can be executed effectively.…”
Get full text
Article -
134
Detection of malicious domain name based on a classifier combination
Published 2020-05-01“…As a fundamental service on the internet,domain name system (DNS) can inevitably be abused by malicious activities.Based on the studies of Botnets and other malwares which made use of the domain generation algorithm (DGA),and researches on current major techniques of malicious domain detection,a malicious domain detection framework based on a classifier combination was proposed.The framework applied the support vector machine (SVM) as its main classifier and combined the naive Bayes classifier (NBC) supportively with some statistical characteristics.Experiment result demonstrates that the framework outperformes current techniques in the offline-training time and the capability of detecting unknow malicious domain families,which satisfies the requirement of internet service provider (ISP) to detect and analyze malicious domainson the internet.…”
Get full text
Article