Search
Search Results
-
A Comparative Performance Analysis of Various Antivirus Software
With rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the... -
Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack
Almost all malwares running on web-server are php codes. Then, the present paper creates a next generation antivirus (NGAV) expert in auditing...
-
Quarantine Approach to Defend Against Malicious Codes in a Traditional Antivirus Computer Network
Here, we create an epidemic model that works with conventional antivirus defence to stop dangerous code propagation. Using the fundamental... -
A Customized and Low-Cost Antivirus Solution Focused on User Needs
Many companies, institutions are victims of targeted attacks with malicious software, these attacks cause problems and inconveniences in users where... -
Neutrosophic QUALIFLEX based on neutrosophic hesitancy index for selecting a potential antivirus mask supplier over COVID-19 pandemic
In order to handle simultaneously the cardinal and ordinal information in decision-making process, QUALIFLEX (QUALItative FLE**ble multiple criteria...
-
Game-Theoretic Decision-Making Analysis on Antivirus
Information security decision making is important to an organization. Moreover, the methodology of decision making about information security is... -
A Malware Obfuscation AI Technique to Evade Antivirus Detection in Counter Forensic Domain
Data obfuscation is the process of converting a constant or a variable into computational results of several constants to make it hard for the files... -
Malware
The other important cybersecurity issue is malware. It is nothing but the software which ultimately affects the system, steals information, and... -
IDS and IPS Testing Using Signature and Heuristic Scanning
Since the invention of computer resources, intrusions into the computing environment have been a fairly widespread form of hostile conduct. Over the... -
Auxiliary Services
This chapter describes a set of auxiliary services which do not belong to any specific element in the ground control segment but rather act as... -
Exploring the Relationship Between Digital Engagement and Cybersecurity Practices Among College Students: A Survey Study
This research rigorously investigates the intricate relationship between college students’ digital engagement and their adherence to cybersecurity... -
Detection of Infostealer Variants Through Graph Neural Networks
Cybersecurity technology is capable of detecting malicious software that is recognized by signatures, heuristic rules, or that has been previously... -
Information Protection in a Commercial Bank
This work considers types of information systems that are used by commercial banks to carry out their activities, considers the functionality of... -
An Assessment of Obfuscated Ransomware Detection and Prevention Methods
Ransomware is a special type of malware, which infects a system and limits user’s access to the system and its resources until a ransom is paid. It... -
A Systematic Approach for Evading Antiviruses Using Malware Obfuscation
Investigators and malware creators are getting neck to neck in the competition and thinking of new deadly implements in their fields. Normally,... -
Twitter Data Analysis to Enhance Malware Detection Using ML
In current times, we have seen an escalation of cellular or apps, consisting of useful, congenial apps, and additionally malicious apps (or malware).... -
Detecting Malicious and Clean PowerShell Scripts Among Obfuscated Commands Using Deep Learning Methods and Word Embedding
Microsoft PowerShell is a new generation command line application that comes installed on Windows machines by default. It provides an environment for... -
Malware Detection System Using API-Decision Tree
Recent growth in the Internet shows the utility of the information technologies utilities to the common man, and it plays a major role and changes... -
Deep Learning Based Malware Analysis
Today, hundreds of thousands of new malicious files are being made. The existing pattern-based antivirus solution has difficulties in co** with... -
Predicting the Impact of Android Malicious Samples Via Machine Learning
The Android operating system, as well as smartphone apps for just about everything, is widely available in the official Google Play store and several...