We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 1,491 results
  1. A Comparative Performance Analysis of Various Antivirus Software

    With rapid technological advancement, security has become a major issue due to the increase in malware activity that poses a serious threat to the...
    Conference paper 2023
  2. Next-generation antivirus endowed with web-server Sandbox applied to audit fileless attack

    Almost all malwares running on web-server are php codes. Then, the present paper creates a next generation antivirus (NGAV) expert in auditing...

    Sidney M. L. Lima, Sthéfano H. M. T. Silva, ... Wellington P. dos Santos in Soft Computing
    Article 26 August 2022
  3. Quarantine Approach to Defend Against Malicious Codes in a Traditional Antivirus Computer Network

    Here, we create an epidemic model that works with conventional antivirus defence to stop dangerous code propagation. Using the fundamental...
    Swapnita Mohanty, Prasant Kumar Nayak, Saktiprasad Mohanty in Advances in Energy and Control Systems
    Conference paper 2024
  4. A Customized and Low-Cost Antivirus Solution Focused on User Needs

    Many companies, institutions are victims of targeted attacks with malicious software, these attacks cause problems and inconveniences in users where...
    Aguas Luis, Camero Rosa, ... Arico Lisbeth in Information Technology and Systems
    Conference paper 2023
  5. Neutrosophic QUALIFLEX based on neutrosophic hesitancy index for selecting a potential antivirus mask supplier over COVID-19 pandemic

    In order to handle simultaneously the cardinal and ordinal information in decision-making process, QUALIFLEX (QUALItative FLE**ble multiple criteria...

    Rıdvan Şahin in Soft Computing
    Article 23 August 2022
  6. Game-Theoretic Decision-Making Analysis on Antivirus

    Information security decision making is important to an organization. Moreover, the methodology of decision making about information security is...
    Conference paper 2021
  7. A Malware Obfuscation AI Technique to Evade Antivirus Detection in Counter Forensic Domain

    Data obfuscation is the process of converting a constant or a variable into computational results of several constants to make it hard for the files...
    Ahmed A. Mawgoud, Hussein M. Rady, Benbella S. Tawfik in Enabling AI Applications in Data Science
    Chapter 2021
  8. Malware

    The other important cybersecurity issue is malware. It is nothing but the software which ultimately affects the system, steals information, and...
    Bharat S. Rawal, Gunasekaran Manogaran, Alexender Peter in Cybersecurity and Identity Access Management
    Chapter 2023
  9. IDS and IPS Testing Using Signature and Heuristic Scanning

    Since the invention of computer resources, intrusions into the computing environment have been a fairly widespread form of hostile conduct. Over the...
    Conference paper 2023
  10. Auxiliary Services

    This chapter describes a set of auxiliary services which do not belong to any specific element in the ground control segment but rather act as...
    Chapter 2023
  11. Exploring the Relationship Between Digital Engagement and Cybersecurity Practices Among College Students: A Survey Study

    This research rigorously investigates the intricate relationship between college students’ digital engagement and their adherence to cybersecurity...
    Farha Khan, Shweta Arora, ... Kavita Khati in Machine Intelligence for Research and Innovations
    Conference paper 2024
  12. Detection of Infostealer Variants Through Graph Neural Networks

    Cybersecurity technology is capable of detecting malicious software that is recognized by signatures, heuristic rules, or that has been previously...
    Álvaro Bustos-Tabernero, Daniel López-Sánchez, Angélica González Arrieta in Distributed Computing and Artificial Intelligence, 20th International Conference
    Conference paper 2023
  13. Information Protection in a Commercial Bank

    This work considers types of information systems that are used by commercial banks to carry out their activities, considers the functionality of...
    Conference paper 2022
  14. An Assessment of Obfuscated Ransomware Detection and Prevention Methods

    Ransomware is a special type of malware, which infects a system and limits user’s access to the system and its resources until a ransom is paid. It...
    Ahmad Ghafarian, Deniz Keskin, Graham Helton in Advances in Information and Communication
    Conference paper 2021
  15. A Systematic Approach for Evading Antiviruses Using Malware Obfuscation

    Investigators and malware creators are getting neck to neck in the competition and thinking of new deadly implements in their fields. Normally,...
    Keshav Kaushik, Harshpreet Singh Sandhu, ... Rohit Tanwar in Emergent Converging Technologies and Biomedical Systems
    Conference paper 2022
  16. Twitter Data Analysis to Enhance Malware Detection Using ML

    In current times, we have seen an escalation of cellular or apps, consisting of useful, congenial apps, and additionally malicious apps (or malware)....
    Conference paper 2023
  17. Detecting Malicious and Clean PowerShell Scripts Among Obfuscated Commands Using Deep Learning Methods and Word Embedding

    Microsoft PowerShell is a new generation command line application that comes installed on Windows machines by default. It provides an environment for...
    Seda Kul, Ahmet Manga, ... Ahmet Sayar in Innovations in Smart Cities Applications Volume 6
    Conference paper 2023
  18. Malware Detection System Using API-Decision Tree

    Recent growth in the Internet shows the utility of the information technologies utilities to the common man, and it plays a major role and changes...
    D. Anil Kumar, Susanta Kumar Das, Manoj Kumar Sahoo in Advances in Data Science and Management
    Conference paper 2022
  19. Deep Learning Based Malware Analysis

    Today, hundreds of thousands of new malicious files are being made. The existing pattern-based antivirus solution has difficulties in co** with...
    Conference paper 2021
  20. Predicting the Impact of Android Malicious Samples Via Machine Learning

    The Android operating system, as well as smartphone apps for just about everything, is widely available in the official Google Play store and several...
    Conference paper 2022
Did you find what you were looking for? Share feedback.