|
|
|
Maxim Kolomeets, Olga Tushkanova, Vasily Desnitsky, Lidia Vitkova and Andrey Chechulin
This paper aims to test the hypothesis that the quality of social media bot detection systems based on supervised machine learning may not be as accurate as researchers claim, given that bots have become increasingly sophisticated, making it difficult fo...
ver más
|
|
|
|
|
|
|
Midya Alqaradaghi, Muhammad Zafar Iqbal Nazir and Tamás Kozsik
Static analysis is a software testing technique that analyzes the code without executing it. It is widely used to detect vulnerabilities, errors, and other issues during software development. Many tools are available for static analysis of Java code, inc...
ver más
|
|
|
|
|
|
|
Ammar Alazab, Ansam Khraisat, Moutaz Alazab and Sarabjot Singh
Websites on the Internet are becoming increasingly vulnerable to malicious JavaScript code because of its strong impact and dramatic effect. Numerous recent cyberattacks use JavaScript vulnerabilities, and in some cases employ obfuscation to conceal thei...
ver más
|
|
|
|
|
|
|
Temirlan Bidzhiev,Dmitry Namiot
Pág. 21 - 31
In recent years, neural networks have shown their potential as a new paradigm for solving problems in the field of information technology. They have shown their effectiveness in many areas, but training neural networks is expensive in terms of computing ...
ver más
|
|
|
|
|
|
|
Adelya Khasanova
Pág. 70 - 77
The purpose of this work is to study and implement algorithms for intelligent process analysis in order to optimize the operation of the OS, as well as to identify abnormal and malicious events using the example of event logs of various operating systems...
ver más
|
|
|
|
|
|
|
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and...
ver más
|
|
|
|
|
|
|
Xuan Wu and Yafei Song
In recent years, the presence of malware has been growing exponentially, resulting in enormous demand for efficient malware classification methods. However, the existing machine learning-based classifiers have high false positive rates and cannot effecti...
ver más
|
|
|
|
|
|
|
Vassilios Moussas and Antonios Andreatos
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio...
ver más
|
|
|
|
|
|
|
Won Cho and Joonho Kong
In this paper, we introduce a memory and cache contention denial-of-service attack and its hardware-based countermeasure. Our attack can significantly degrade the performance of the benign programs by hindering the shared resource accesses of the benign ...
ver más
|
|
|
|
|
|
|
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar...
ver más
|
|
|
|