13   Artículos

 
en línea
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari    
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c... ver más
Revista: Information    Formato: Electrónico

 
en línea
Jin Woo Kim, Saerom Park, Young Whan Sung, Hak Jin Song, Sung Woo Yang, Jiwoo Han, Jeong Wook Jo, Im-Soon Lee, Sang Hyun Lee, Yong-Keun Choi and Hyung Joo Kim    
Commiphora myrrha (T.Nees) Engl. resin extracts were prepared via immersion in extraction solvents (hot water, DMSO, hexane, ethanol, and methanol) which have various physical properties, such as different polarity and dielectric constant values. Methano... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos    
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov    
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Vassilios Moussas and Antonios Andreatos    
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio    
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Supriya Deshpande,Shirish Pattalwar,Poonam Lohiya     Pág. 137 - 147
A number of android security and privacy vulnerabilities have been exposed in past several years. However, the mobile malware and privacy leakage remain a big threat to mobile phone security and privacy. It has been observed that phone camera would becom... ver más
Revista: IRA-International Journal of Technology & Engineering    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »