Skip to main content
Android is a very popular operating system for mobile devices. It is also being used for the IoT enabled devices in the present scenario. The popularity if the android also makes it susceptible to attacks with respect to security. The... more
    • by 
    •   5  
      Machine Learning, Static Analysis, Malware, Supervised Learning
Many researchers have built different kinds of malware in the past years. Theses malwares have helped in discovering security flaws in many systems, and they have actually contributed a lot in the security industry. This paper proposes a... more
    • by 
    •   2  
      Computer Security, Malware
Android is increasingly being targeted by malware since it has become the most popular mobile operating system worldwide. Evasive malware families, such as Chamois, designed to turn Android devices into bots that form part of a larger... more
    • by  and +2
    •   15  
      Machine Learning, Android, Malware, Deep Learning
Malware is the main computer security threat that can cause damage to user's devices and company's infrastructure. End users who want to download executable files from the Internet are currently presented by a binary choice (OK or... more
    • by 
    •   5  
      Virtual Machines, Cloud Computing, Malware Analysis, Malware
Ransomware has rapidly become one of the internet's greatest threats, with occasional new iterations being deployed. It is a rising challenge to company data and new versions emerge regularly as a result of the vast sums of money to be... more
    • by 
    •   2  
      Network Security, Malware
Rootkit is an auxiliary tool for sniffing, stealing and hiding, so it has become the key component in almost all successful attacks. Analysis of rootkits will provide system administrators and security software managers the ability to... more
    • by 
    •   4  
      Ontology, Security, Malware, Rootkit
Background and Objective: Every second, on average, 8 (eight) new malware are created. So, our goal is to propose an antivirus, endowed with artificial intelligence, able of identifying malwares through models based on fast training and... more
    • by 
    •   4  
      Computer Forensics, Malware, Computer Virus and Antivirus, High Performance Computing (HPC)
With the increasing volume of smartphones, computers, and sensors in the Internet of Things (IoT) model, enhancing security and preventing ransom attacks have become a major concern. Traditional security mechanisms are no longer... more
    • by 
    •   4  
      Malware, Internet of Things (IoT), Smartphone, ransomware
    • by 
    •   2  
      Malware, Security Awareness
    • by 
    •   3  
      Malware, Computer Virus and Antivirus, Security Awareness
Tugas 3 Pengantar Keamanan Komputer
    • by 
    •   2  
      Malware, Computer Virus and Antivirus
1. Malware Malware murapakan singkatan dari Malicious Sofware, yang artinya sebuah program jahat, seperti namanya, malware dibuat dengan tujuan untuk merusak atau mengambil alih control sebuah computer, bisa juga untuk mengambil informasi... more
    • by 
    • Malware
A. Pendahuluan Di era modern ini penggunaan perangkat lunak sangatlah penting dalam kehidupan sehari-hari, baik itu untuk bekerja, sekolah maupun kegiatan rumah tangga semuanya membutuhkan bantuan dari perangkat digital. Banyak data-data... more
    • by 
    •   3  
      Windows, Malware, Antivírus
Internet users use the web every day for Browsing, Email, Banking, Social Media, and Web File & Video downloads. This research paper aims to help world internet users how not to get victimized to EMOTET malware-A Banking Credentials... more
    • by 
    •   6  
      Malware, Cyber Security, Phishing, IT Security
This study has been undertaken to provide an understanding on the level of the general public's knowledge about ransomware and its potential damage or financial loss. Questions have been asked including if payment would be made if the... more
    • by 
    •   4  
      Malware, Cyber Security, Cryptocurrency, ransomware
Cyberstalking is a special form of stalking and involves the use of information and communication technologies as the means and the medium of harassment or intimidation. Cyberstalking can lead to significant and long lasting... more
    • by 
    •   17  
      Criminology, Criminal Law, Violence, Privacy
Credit card fraud presents an impressive array of forms and methods, often involving sophisticated means, organized crime aspects, and very significant criminal proceeds. Based on an extensive inquiry that involved the study of a large... more
    • by 
    •   20  
      Criminology, Information Security, Internet Studies, Sustainable Development
This article is an extensive inquiry into computer damage cases based on the comprehensive study of over three hundred cases brought to courts in violation of 18 U.S.C. § 1030(a)(5). Based on an empirical categorization of the essential... more
    • by 
    •   20  
      Criminology, Criminal Law, Internet Law, Hacktivism
Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT... more
    • by 
    •   8  
      Machine Learning, Intrusion Detection Systems, Malware Analysis, Malware
Malware is today one of the biggest security threat to internet. People today use terms such as malware, spyware, or ransomware much more than the term "virus" where Malware can steal your information, make your device send SMS messages... more
    • by 
    •   3  
      Machine Learning, Clustering and Classification Methods, Malware