Skip to main content
    • by 
    •   5  
      Anomaly Detection, Intrusion Detection, Malware Detection, Side-channel attack
The proposed paper investigates commercial antiviruses. About 17% of the antiviruses did not recognize the existence of the malicious samples analyzed. In order to overcome the limitations of commercial antiviruses, this project creates... more
    • by 
    •   4  
      Computer Forensics, Artificial Neural Networks, Malware Detection, Computer Virus and Antivirus
Android has recently seen a global surge in its share of global markets and widespread use, but at the same time it has been plagued by malicious software attacks. Last year was a difficult year for Google Play, the Android app store.... more
    • by 
    • Malware Detection
Cloud computing is being alternate choice of pc and mobile users for knowledge and provide storage and access. Cloud computing is that the development of parallel computing, distributed computing, grid computing and virtualization... more
    • by 
    •   5  
      Cloud Computing, Malware Detection, Malware Detection Techniques, Network security and cloud computing
As we all know that the Android Platform is developed by Google for mobile devices with powerful processing capabilities. Its kernel is based on Linux OS. The android applications run in a sandbox. Nonetheless, many organizations such as... more
    • by 
    •   2  
      Malware Detection, Android Security and Privacy
Malware is a software developed to compromise the privacy and confidentiality of a user. In this digital era, where everything is computerized and automated, if the data is compromised, then, it could easily incapacitate countries and... more
    • by  and +1
    •   4  
      Random Forest, Malware Detection, Decision Tree, Correlated Features
Nowadays, the usage of smartphones and their applications have become rapidly popular in people's daily life. Over the last decade, availability of mobile money services such as mobile-payment systems and app markets have significantly... more
    • by 
    •   3  
      Malware Analysis, Malware Detection, mobile malware
This paper presents Similo, an automated scalable framework for control logic forensics in industrial control systems. Similo is designed to investigate denial of engineering operations (DEO) attacks, recently demonstrated to hide... more
    • by  and +1
    •   7  
      Malware Analysis, Digital Forensics, Malware Detection, Security Systems
Nowadays, with portable computation equipment becoming extra commonly depended besides incorporated through extra sensitive structures such as infrastructure besides armed or regulation implementation. However, is being clearer when... more
    • by  and +1
    •   4  
      Android, Malware Detection, Android Development, Malware Detection Techniques
Malware is an application that is harmful to your forensic information. Basically, malware analyses is the process of analysing the behaviours of malicious code and then create signatures to detect and defend against it.Malware, such as... more
    • by 
    •   4  
      Malware Detection, Forensic Intelligence, Cyber Crimes, Data Analysis Tools
Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT... more
    • by  and +3
    •   7  
      Malware Detection, Cyber Security, Malware Classification, Internet of Things (IoT)
The world is currently ravaged by the novel coronavirus which has so far affected 82,410 persons in 50 countries with a death toll of 2,808 as at 27 th February 2020, and code-named COVID-19 by the World Health Organization (WHO) on 11 th... more
    • by 
    •   20  
      Internet Security, Computer Security, Internet Safety, Malware Analysis
SIEM ve SOAR ürünlerinin birlikte kullanımı ile zararlı yazılım tespiti ile alakalı bir değerlendirme çalışmasıdır.
    • by 
    •   3  
      Malware Analysis, Malware Detection, SIEM
With the increasing utilization of the Internet and its provided services, an increase in cyber-attacks to exploit the information occurs. A technology to store and maintain user's information that is mostly used for its simplicity and... more
    • by 
    •   10  
      Machine Learning, Computational Intelligence, Network Security, Computer Networks
Message from the Guest Editor: This Special Issue calls for contributions that focus on novel, efficient and high-accuracy detection of malware on the mobile platform using machine learning. The Special Issue invites authors to submit... more
    • by 
    •   9  
      Computer Science, Artificial Intelligence, Machine Learning, Malware Analysis
Malicious software are rampant and do great harm. The present mainstream malware detection technology has many disadvantages, such as high labour cost, large system overhead, and inability to detect new malware. We propose a novel fusion... more
    • by 
    •   4  
      Malware Detection, ICT Integration model, Grayscale Image In Lsb, Convolutional Neural Networks
Android, being the most widespread mobile operating systems is increasingly becoming a target for malware. Malicious apps designed to turn mobile devices into bots that may form part of a larger botnet have become quite common, thus... more
    • by  and +1
    •   6  
      Computer Science, Machine Learning, Mobile Security, Malware Detection
Malware has always been a threat to the computer world, but with fast growth in the use of the internet, malware severely affects the computer world. Malware predictors and detectors are critical tools in defense against malware. The... more
    • by  and +1
    •   3  
      Machine Learning, Data Mining, Malware Detection
As we have seen several versions of Shamoon malware like 2 and 3 Generation , the fourth version has been spread, but it did not was famous like version 3 . In this paper i will analyze the Shamoon 4 malware , which may be the next target... more
    • by 
    •   17  
      Forensics, Middle East Studies, Cyber Conflict, Computer Security
Quick Response Code technology has made so easy many human digital transactions such as payment, authentication, advertisement, web navigation and others. This technology, despite being widely accepted because of its ease of creation,... more
    • by 
    •   5  
      Machine Learning, Artificial Neural Networks, Malware Detection, Malware Reverse Engineering