|
|
|
Ammar Yahya Daeef, Ali Al-Naji, Ali K. Nahar and Javaan Chahl
Malware is the primary attack vector against the modern enterprise. Therefore, it is crucial for businesses to exclude malware from their computer systems. The most responsive solution to this issue would operate in real time at the edge of the IT system...
ver más
|
|
|
|
|
|
|
Yuxin Zhang, Shumian Yang, Lijuan Xu, Xin Li and Dawei Zhao
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown to be effective ...
ver más
|
|
|
|
|
|
|
Angelo Cannarile, Vincenzo Dentamaro, Stefano Galantucci, Andrea Iannacone, Donato Impedovo and Giuseppe Pirlo
Recognition of malware is critical in cybersecurity as it allows for avoiding execution and the downloading of malware. One of the possible approaches is to analyze the executable?s Application Programming Interface (API) calls, which can be done using t...
ver más
|
|
|
|
|
|
|
Mohammed N. AlJarrah, Qussai M. Yaseen and Ahmad M. Mustafa
The Android platform has become the most popular smartphone operating system, which makes it a target for malicious mobile apps. This paper proposes a machine learning-based approach for Android malware detection based on application features. Unlike man...
ver más
|
|
|
|
|
|
|
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software...
ver más
|
|
|
|
|
|
|
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin...
ver más
|
|
|
|
|
|
|
Ding Yourun,Dmitry E. Gouriev
Pág. 91 - 94
The MDIO interface is used in conjunction with the Ethernet MAC-PHY interfaces MII, RMII, SMII, GMII, RGMII, SGMII and provides an access to the internal registers of the Ethernet transceiver (which is also known as the Ethernet PHY). The only Linux oper...
ver más
|
|
|
|
|
|
|
Andrei Chi?
Pág. 1 - 18
This article reports on the Design Science engineering cycle for implementing a modeling method to support model-driven, process-centric API management. The BPMN standard was hereby enriched on semantic, syntactic and tool levels in order to provide a vi...
ver más
|
|
|
|