![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessZn \(_{1-x}\) Ni \(_x\) Te semiconductor nanocrystals in transparent glass for optoelectronic device applications
Do** glass with semiconductors, particularly with nanostructured semiconductors, has attracted attention due to the large optical absorption cross-sections of the latter. Based on this property, Ni ...
-
Article
Detecting Cryptomining Malware: a Deep Learning Approach for Static and Dynamic Analysis
Cryptomining malware (also referred to as cryptojacking) has changed the cyber threat landscape. Such malware exploits the victim’s CPU or GPU resources with the aim of generating cryptocurrency. In this paper...
-
Article
A multiview learning method for malware threat hunting: windows, IoT and android as case studies
Malware remains a threat to our cyberspace and increasingly digitalized society. Current malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes, and API calls, to distinguish malwa...