|
|
|
Sharoug Alzaidy and Hamad Binsalleeh
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,...
ver más
|
|
|
|
|
|
|
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ...
ver más
|
|
|
|
|
|
|
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin...
ver más
|
|
|
|
|
|
|
Denis Khryashchev, Jie Chu, Mikael Vejdemo-Johansson and Ping Ji
The Evasion Problem is the question of whether?given a collection of sensors and a particular movement pattern over time?it is possible to stay undetected within the domain over the same stretch of time. It has been studied using topological techniques s...
ver más
|
|
|
|
|
|
|
Xuan Dau Hoang and Quynh Chi Nguyen
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System...
ver más
|
|
|
|
|
|
|
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ...
ver más
|
|
|
|
|
|
|
Mehrdad Ghanbari,Zahra Nouri,Mahnaz Mahdavi,Mahin Absalan Nezhad,Zahra Azizi,Akhtar Derikvand Moghadam
Pág. 73 - 78
The main purpose of this research is considered of performance techniques for competent of tax system in country. Base of this research, this question will discusses why the tax system in country is ineffective? Although several answers bear in mind for ...
ver más
|
|
|
|
|
|
|
Xingguo Li, Junfeng Wang and Xiaosong Zhang
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe...
ver más
|
|
|
|
|
|
|
SULPECIA PONCE,DOMSHELL CAHILES
This study attempts to explore the involvement in graft and corruption among elective barangay youth officials in a city inSouthern Philippines. Using a qualitative research design employing a case study method, 10 informants were included in thisstudy a...
ver más
|
|
|
|