|
|
|
Yuxin Zhang, Shumian Yang, Lijuan Xu, Xin Li and Dawei Zhao
As the amount of malware has grown rapidly in recent years, it has become the most dominant attack method in network security. Learning execution behavior, especially Application Programming Interface (API) call sequences, has been shown to be effective ...
ver más
|
|
|
|
|
|
|
Muhammad Idris, Iwan Syarif, Idris Winarno
Pág. 246 - 261
The trend of API-based systems in web applications in the last few years keeps steadily growing. API allows web applications to interact with external systems to enable business-to-business or system-to-system integration which leads to multiple applicat...
ver más
|
|
|
|
|
|
|
Iosif Progoulakis, Paul Rohmeyer and Nikitas Nikitakos
The integration of IT, OT, and human factor elements in maritime assets is critical for their efficient and safe operation and performance. This integration defines cyber physical systems and involves a number of IT and OT components, systems, and functi...
ver más
|
|
|
|
|
|
|
Efstratios Chatzoglou, Georgios Kambourakis and Vasileios Kouliaridis
Using automotive smartphone applications (apps) provided by car manufacturers may offer numerous advantages to the vehicle owner, including improved safety, fuel efficiency, anytime monitoring of vehicle data, and timely over-the-air delivery of software...
ver más
|
|
|
|
|
|
|
Daekyo Jung, Vu Tran Tuan, Dai Quoc Tran, Minsoo Park and Seunghee Park
In order to protect human lives and infrastructure, as well as to minimize the risk of damage, it is important to predict and respond to natural disasters in advance. However, currently, the standardized disaster response system in South Korea still need...
ver más
|
|
|
|
|
|
|
Dmitry Namiot,Ivan Makarychev
Pág. 74 - 90
The paper examines the implementation of one approach to alternative presentation of location information in social networks. The classic model consists in placing a record (message) with some real or virtual place, which is described by a pair of geogra...
ver más
|
|
|
|
|
|
|
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin...
ver más
|
|
|
|
|
|
|
Ajit Kumar, Vinti Agarwal, Shishir Kumar Shandilya, Andrii Shalaginov, Saket Upadhyay and Bhawna Yadav
Android malware has become the topmost threat for the ubiquitous and useful Android ecosystem. Multiple solutions leveraging big data and machine-learning capabilities to detect Android malware are being constantly developed. Too often, these solutions a...
ver más
|
|
|
|
|
|
|
Alessandro Bellini, Emanuele Bellini, Monica Gherardelli and Franco Pirri
The Internet of Things (IoT) is a remarkable data producer and these data may be used to prevent or detect security vulnerabilities and increase productivity by the adoption of statistical and Artificial Intelligence (AI) techniques. However, these desir...
ver más
|
|
|
|
|
|
|
Andrei Brazhuk
Pág. 38 - 41
This paper discusses the problem of extracting and using knowledge of public directories of software attacks and vulnerabilities to build semantic threat models. The possible purpose of such models is using as a core of a knowledge managem...
ver más
|
|
|
|