Showing 41 - 60 results of 62 for search 'Malwa*', query time: 0.06s Refine Results
  1. 41

    Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications by Mohammad Aldossary, Ibrahim Alzamil, Jaber Almutairi

    Published 2025-01-01
    “…Distributed Denial of Service (DDoS) attacks, malware infections, and communication abnormalities increase cybersecurity dangers to these networks, threatening operational safety and efficiency. …”
    Get full text
    Article
  2. 42

    An Analysis of Security System for Intrusion in Smartphone Environment by Maya Louk, Hyotaek Lim, HoonJae Lee

    Published 2014-01-01
    “…There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. …”
    Get full text
    Article
  3. 43

    Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama by Abdul Gofur, Rizal Fathoni Aji, Heri Kurniawan

    Published 2024-08-01
    “…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. Dengan adanya serangan malware yang mengakibatkan terinfeksinya dokumen laporan perusahaan dan kerugian finansial yang disebabkan oleh faktor kelalaian sumber daya manusia, menjadi pertimbangan perlu untuk dilakukan pengukuran kesadaran keamanan informasi dan mengetahui area yang perlu ditingkatkan. …”
    Get full text
    Article
  4. 44

    Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring by Alde Alanda, H.A Mooduto, Ronal Hadi

    Published 2023-09-01
    “…Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. …”
    Get full text
    Article
  5. 45

    Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN by Kuni Inayah, Kalamullah Ramli

    Published 2024-08-01
    “…The model classifies 10 (ten) classifications, namely Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), and other types of attacks. …”
    Get full text
    Article
  6. 46

    Evaluating the Performance of a Static Patching Strategy against Computer Viruses by Da-Wen Huang, Lu-Xing Yang, Xiaofan Yang, Xiang Zhong, Yuan Yan Tang

    Published 2020-01-01
    “…Our findings provide a significant guidance for restraining malware propagation.…”
    Get full text
    Article
  7. 47

    Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection by Yongsik Kim, Su-Youn Hong, Sungjin Park, Huy Kang Kim

    Published 2025-01-01
    “…When calculating the reward in reinforcement learning, we used the comparison value with the pre-trained Seq2Seq model, the malware log sequence detected by the rule set based on reinforcement learning, and the false positive value generated by the normal data to create its own rule set. …”
    Get full text
    Article
  8. 48

    New Heuristics Method for Malicious URLs Detection Using Machine Learning by Maher Kassem Hasan

    Published 2024-09-01
    “… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
    Get full text
    Article
  9. 49

    Consumer Protection of Girls from Cybercrime in a Gender Perspective by Susilowati Suparto, Deviana Yuanitasari, Sonny Dewi Judiasih, Yamudin Salaeh

    Published 2024-12-01
    “…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. Girls are often the primary targets of these various forms of cybercrime. …”
    Get full text
    Article
  10. 50

    Unveiling personalized and gamification-based cybersecurity risks within financial institutions by Amna Shahzadi, Kashif Ishaq, Naeem A. Nawaz, Fadhilah Rosdi, Fawad Ali Khan

    Published 2025-02-01
    “…The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (e.g., phishing, malware, APTs) and non-game-based (e.g., social engineering, compliance issues) threats. …”
    Get full text
    Article
  11. 51

    Leaking Network Devices with Rubber Ducky Attack by Zeynep Rana Donmez, Şeyma Atmaca, Yıldıray YALMAN

    Published 2024-12-01
    “…Unlike traditional electronic attacks, it relies on manipulating individuals to run malware-infected devices or share sensitive information willingly. …”
    Get full text
    Article
  12. 52
  13. 53

    MSSA: multi-stage semantic-aware neural network for binary code similarity detection by Bangrui Wan, Jianjun Zhou, Ying Wang, Feng Chen, Ying Qian

    Published 2025-01-01
    “…Binary code similarity detection (BCSD) aims to identify whether a pair of binary code snippets is similar, which is widely used for tasks such as malware analysis, patch analysis, and clone detection. …”
    Get full text
    Article
  14. 54

    Software Authority Transition through Multiple Distributors by Kyusunk Han, Taeshik Shon

    Published 2014-01-01
    “…Such openness, however, can promote serious threats, including malware and illegal usage. In order to prevent such threats, several stores use online authentication techniques. …”
    Get full text
    Article
  15. 55

    A New Sensors-Based Covert Channel on Android by Ahmed Al-Haiqi, Mahamod Ismail, Rosdiadee Nordin

    Published 2014-01-01
    “…Accelerometers generate signals that reflect user motions, and malware applications can apparently only read their data. …”
    Get full text
    Article
  16. 56

    A Review about Internet of Things (IoT) integration with Cloud Computing with a Limelight on Security by Umm e Kulsoom, Syeda Faiza Nasim, Asma Qaiser, Sidra Aziz, Syeda Alishba Fatima

    Published 2024-01-01
    “…Through an in-depth analysis of recent research, we examine the security challenges associated with IoT-based cloud computing, including account hacking, phishing, malware, middleman attacks, and service denial. We also discuss the potential benefits, architectural integration options, and the impact of IoT on cloud computing. …”
    Get full text
    Article
  17. 57

    Analisis Perilaku Entitas untuk Pendeteksian Serangan Internal Menggunakan Kombinasi Model Prediksi Memori dan Metode PCA by Rahmat - Budiarto, Yanif Dwi Kuntjoro

    Published 2023-12-01
    “…External attacks can be prevented using firewalls, anti-virus software, and special software for intruder and malware detection. This study intention is to build a model for analyzing entity behavior using a memory prediction model and uses the principal component analysis (PCA) as a feature selection method and implement it to detect cyber-attacks and anomalies involving insiders. …”
    Get full text
    Article
  18. 58

    Security Risks and Designs in the Connected Vehicle Ecosystem: In-Vehicle and Edge Platforms by Marco De Vincenzi, John Moore, Bradley Smith, Sanjay E. Sarma, Ilaria Matteucci

    Published 2025-01-01
    “…By analyzing case studies such as Android Automotive, Message Queuing Telemetry Transport (MQTT), and the Robot Operating System (ROS), we identify the primary security threats, including malware attacks, data manipulation, and Denial of Service (DoS) attacks. …”
    Get full text
    Article
  19. 59

    Identifikasi Malicious Host dalam Local Area Network Menggunakan Teknik Graph Clustering dan Filtering by Khafidzun Fadli, Achmad Basuki, Eko Setiawan

    Published 2020-05-01
    “…Actions to reduce the spread of malware in the LAN can be done by identifying malicious hosts. …”
    Get full text
    Article
  20. 60

    Approaches to cyber weapons classification problem by V. V. Kabernik

    Published 2013-04-01
    “…Working criteria for differentiation between information warfare and practical cyber warfare is suggested for proper classification of malware, espionage toolkits, hacking tools and combat software.…”
    Get full text
    Article