|
|
|
Ehab Alkhateeb, Ali Ghorbani and Arash Habibi Lashkari
This research addresses a critical need in the ongoing battle against malware, particularly in the form of obfuscated malware, which presents a formidable challenge in the realm of cybersecurity. Developing effective antivirus (AV) solutions capable of c...
ver más
|
|
|
|
|
|
|
Jin Woo Kim, Saerom Park, Young Whan Sung, Hak Jin Song, Sung Woo Yang, Jiwoo Han, Jeong Wook Jo, Im-Soon Lee, Sang Hyun Lee, Yong-Keun Choi and Hyung Joo Kim
Commiphora myrrha (T.Nees) Engl. resin extracts were prepared via immersion in extraction solvents (hot water, DMSO, hexane, ethanol, and methanol) which have various physical properties, such as different polarity and dielectric constant values. Methano...
ver más
|
|
|
|
|
|
|
Adam Lockett, Ioannis Chalkias, Cagatay Yucel, Jane Henriksen-Bulmer and Vasilis Katos
Technologies providing copyright-infringing IPTV content are commonly used as an illegal alternative to legal IPTV subscriptions and services, as they usually have lower monetary costs and can be more convenient for users who follow content from differen...
ver más
|
|
|
|
|
|
|
Merve Ozkan-Okay, Refik Samet, Ömer Aslan, Selahattin Kosunalp, Teodor Iliev and Ivaylo Stoyanov
The fast development of communication technologies and computer systems brings several challenges from a security point of view. The increasing number of IoT devices as well as other computing devices make network communications more challenging. The num...
ver más
|
|
|
|
|
|
|
Vassilios Moussas and Antonios Andreatos
Malware creators generate new malicious software samples by making minor changes in previously generated code, in order to reuse malicious code, as well as to go unnoticed from signature-based antivirus software. As a result, various families of variatio...
ver más
|
|
|
|
|
|
|
Xiaofeng Lu, Fei Wang, Cheng Jiang and Pietro Lio
In this study, Portable Document Format (PDF), Word, Excel, Rich Test format (RTF) and image documents are taken as the research objects to study a static and fast method by which to detect malicious documents. Malicious PDF and Word document features ar...
ver más
|
|
|
|
|
|
|
Supriya Deshpande,Shirish Pattalwar,Poonam Lohiya
Pág. 137 - 147
A number of android security and privacy vulnerabilities have been exposed in past several years. However, the mobile malware and privacy leakage remain a big threat to mobile phone security and privacy. It has been observed that phone camera would becom...
ver más
|
|
|
|