14   Artículos

 
en línea
Sharoug Alzaidy and Hamad Binsalleeh    
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula    
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ... ver más
Revista: Information    Formato: Electrónico

 
en línea
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca    
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin... ver más
Revista: Information    Formato: Electrónico

 
en línea
Denis Khryashchev, Jie Chu, Mikael Vejdemo-Johansson and Ping Ji    
The Evasion Problem is the question of whether?given a collection of sensors and a particular movement pattern over time?it is possible to stay undetected within the domain over the same stretch of time. It has been studied using topological techniques s... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Xuan Dau Hoang and Quynh Chi Nguyen    
In recent years, botnets have become one of the major threats to information security because they have been constantly evolving in both size and sophistication. A number of botnet detection measures, such as honeynet-based and Intrusion Detection System... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Shayan Taheri, Milad Salem and Jiann-Shiun Yuan    
The advancements in the Internet has enabled connecting more devices into this technology every day. The emergence of the Internet of Things has aggregated this growth. Lack of security in an IoT world makes these devices hot targets for cyber criminals ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Mehrdad Ghanbari,Zahra Nouri,Mahnaz Mahdavi,Mahin Absalan Nezhad,Zahra Azizi,Akhtar Derikvand Moghadam     Pág. 73 - 78
The main purpose of this research is considered of performance techniques for competent of tax system in country. Base of this research, this question will discusses why the tax system in country is ineffective? Although several answers bear in mind for ... ver más
Revista: International Review of Management and Marketing    Formato: Electrónico

 
en línea
Xingguo Li, Junfeng Wang and Xiaosong Zhang    
With the help of botnets, intruders can implement a remote control on infected machines and perform various malicious actions. Domain Name System (DNS) is very famous for botnets to locate command and control (C and C) servers, which enormously strengthe... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
SULPECIA PONCE,DOMSHELL CAHILES    
This study attempts to explore the involvement in graft and corruption among elective barangay youth officials in a city inSouthern Philippines. Using a qualitative research design employing a case study method, 10 informants were included in thisstudy a... ver más
Revista: Journal of Government and Politics    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »