|
|
|
Xinyi Meng and Daofeng Li
The explosive growth of malware targeting Android devices has resulted in the demand for the acquisition and integration of comprehensive information to enable effective, robust, and user-friendly malware detection. In response to this challenge, this pa...
ver más
|
|
|
|
|
|
Jee-Tae Park, Chang-Yui Shin, Ui-Jun Baek and Myung-Sup Kim
The classification of encrypted traffic plays a crucial role in network management and security. As encrypted network traffic becomes increasingly complicated and challenging to analyze, there is a growing need for more efficient and comprehensive analyt...
ver más
|
|
|
|
|
|
Carolina Bona-Sánchez, Heidi Salokangas and Kaisa Sorsa
This study explores the complexities of cost behavior in the textile industry, conducting a comparative analysis between firms in the Nordic countries and Spain. Our main goal is to examine how distinct economic and corporate governance models impact the...
ver más
|
|
|
|
|
|
Bahaa Yamany, Mahmoud Said Elsayed, Anca D. Jurcut, Nashwa Abdelbaki and Marianne A. Azer
Ransomware is a type of malicious software that encrypts a victim?s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizatio...
ver más
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|