|
|
|
Nikola Andelic, Sandi Baressi ?egota and Zlatan Car
Malware detection using hybrid features, combining binary and hexadecimal analysis with DLL calls, is crucial for leveraging the strengths of both static and dynamic analysis methods. Artificial intelligence (AI) enhances this process by enabling automat...
ver más
|
|
|
|
|
|
Sultan Ahmed Almalki, Ahmed Abdel-Rahim and Frederick T. Sheldon
The adoption of cooperative intelligent transportation systems (cITSs) improves road safety and traffic efficiency. Vehicles connected to cITS form vehicular ad hoc networks (VANET) to exchange messages. Like other networks and systems, cITSs are targete...
ver más
|
|
|
|
|
|
Qihong Yu, Jiguo Li and Sai Ji
In the past 10 years, many side-channel attacks have been discovered and exploited one after another by attackers, which have greatly damaged the security of cryptographic systems. Since no existing anonymous broadcast encryption scheme can resist the si...
ver más
|
|
|
|
|
|
Aakarsh Rao, Nadir A. Carreón, Roman Lysecky and Jerzy Rozenblit
Life-critical embedded systems, including medical devices, are becoming increasingly interconnected and interoperable, providing great efficiency to the healthcare ecosystem. These systems incorporate complex software that plays a significantly integrati...
ver más
|
|
|
|
|
|
Xin Li, Lu Wang, Yang Xin, Yixian Yang, Qifeng Tang and Yuling Chen
This study can be applied to software vulnerability detection.
|
|
|