29   Artículos

 
en línea
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin    
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Midya Alqaradaghi, Muhammad Zafar Iqbal Nazir and Tamás Kozsik    
Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code, inc... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh    
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Temirlan Bidzhiev,Dmitry Namiot     Pág. 21 - 31
In recent years, neural networks have shown their potential as a new paradigm for solving problems in the field of information technology. They have shown their effectiveness in many areas, but training neural networks is expensive in terms of computing ... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Adelya Khasanova     Pág. 70 - 77
The purpose of this work is to study and implement algorithms for intelligent process analysis in order to optimize the operation of the OS, as well as to identify abnormal and malicious events using the example of event logs of various operating systems... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed    
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xuan Wu and Yafei Song    
In recent years, the presence of malware has been growing exponentially, resulting in enormous demand for efficient malware classification methods. However, the existing machine learning-based classifiers have high false positive rates and cannot effecti... ver más
Revista: Information    Formato: Electrónico

 
en línea
Vassilios Moussas and Antonios Andreatos    
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Won Cho and Joonho Kong    
In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure. Our attack can significantly degrade the performance of the benign programs by hindering the shared resource accesses of the benign ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio    
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »