-
101
-
102
-
103
-
104
Enhanced Intrusion Detection in Drone Networks: A Cross-Layer Convolutional Attention Approach for Drone-to-Drone and Drone-to-Base Station Communications
Published 2025-01-01“…Distributed Denial of Service (DDoS) attacks, malware infections, and communication abnormalities increase cybersecurity dangers to these networks, threatening operational safety and efficiency. …”
Get full text
Article -
105
An Analysis of Security System for Intrusion in Smartphone Environment
Published 2014-01-01“…There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. …”
Get full text
Article -
106
Pengukuran Kesadaran Keamanan Informasi Pegawai: Studi Kasus PT Meshindo Jayatama
Published 2024-08-01“…Hasil wawancara dengan Presiden Direktur dan Manager Teknologi Informasi (TI) PT Meshindo Jayatama menyatakan bahwa telah terjadi serangan seperti Phishing dan Malware sebanyak 26 kali ditahun 2023. Dengan adanya serangan malware yang mengakibatkan terinfeksinya dokumen laporan perusahaan dan kerugian finansial yang disebabkan oleh faktor kelalaian sumber daya manusia, menjadi pertimbangan perlu untuk dilakukan pengukuran kesadaran keamanan informasi dan mengetahui area yang perlu ditingkatkan. …”
Get full text
Article -
107
Survey on key technologies for protective DNS service
Published 2024-10-01“…Common DNS abuses and related security threats on the client side include phishing, malware, and other attacks based on DNS. The protective DNS (PDNS) service leverages the existing DNS protocol and architecture to detect and mitigate threats by analyzing DNS queries, thereby protecting users against potential security threads at the source. …”
Get full text
Article -
108
Real-time Defense Against Cyber Threats: Analyzing Wazuh's Effectiveness in Server Monitoring
Published 2023-09-01“…Wazuh's capabilities such as log data collection, malware detection, active response automation, and Docker container monitoring, are examined. …”
Get full text
Article -
109
Cyber Security Intrusion Detection Using a Deep Learning Method
Published 2025-01-01“…Present methods to detect, predict and prevent malware still fall short of the desired level. The new techniques of deep learning are poised to succeed for detecting intrusion by employing different algorithms of detection and prevention. …”
Get full text
Article -
110
MODIFICAREA PEISAJULUI AMENINȚĂRILOR CIBERNETICE DATORITĂ IMPLICĂRII GRUPĂRILOR DE CYBERCRIME ÎN RĂZBOIUL RUSO-UCRAINEAN
Published 2023-01-01“…There were identified changes in malware-as-a-service and ransomware-as-a-service attacks, as well as changes in cybercriminal tactics and methods to orchestrate an attack. …”
Get full text
Article -
111
Analisis Kinerja Intrusion Detection System Berbasis Algoritma Random Forest Menggunakan Dataset Unbalanced Honeynet BSSN
Published 2024-08-01“…The model classifies 10 (ten) classifications, namely Benign, Information Leak, Malware, Trojan Activity, Information Gathering, APT, Exploit, Web Application Attack, Denial of Service (DoS), and other types of attacks. …”
Get full text
Article -
112
Evaluating the Performance of a Static Patching Strategy against Computer Viruses
Published 2020-01-01“…Our findings provide a significant guidance for restraining malware propagation.…”
Get full text
Article -
113
Reinforcement Learning-Based Generative Security Framework for Host Intrusion Detection
Published 2025-01-01“…When calculating the reward in reinforcement learning, we used the comparison value with the pre-trained Seq2Seq model, the malware log sequence detected by the rule set based on reinforcement learning, and the false positive value generated by the normal data to create its own rule set. …”
Get full text
Article -
114
Lightweight Models for Real-Time Steganalysis: A Comparison of MobileNet, ShuffleNet, and EfficientNet
Published 2024-12-01“…Steganography conceals data within digital media, but its misuse for cyberattacks—such as embedding malware—has highlighted the need for steganalysis, the detection of hidden data. …”
Get full text
Article -
115
New Heuristics Method for Malicious URLs Detection Using Machine Learning
Published 2024-09-01“… Malicious URLs are a very prominent, dangerous form of cyber threats in view of the fact that they can enable many evils like phishing attacks, malware distribution, and several other kinds of cyber fraud. …”
Get full text
Article -
116
Consumer Protection of Girls from Cybercrime in a Gender Perspective
Published 2024-12-01“…Cybercrime covers a wide range of illegal acts carried out through the Internet or other digital devices, including fraud, identity theft, hacking, the spread of malware, to sexual exploitation of children. Girls are often the primary targets of these various forms of cybercrime. …”
Get full text
Article -
117
Unveiling personalized and gamification-based cybersecurity risks within financial institutions
Published 2025-02-01“…The article also offers a comprehensive taxonomy of financial services, categorizing cyber threats into game-based (e.g., phishing, malware, APTs) and non-game-based (e.g., social engineering, compliance issues) threats. …”
Get full text
Article -
118
Leaking Network Devices with Rubber Ducky Attack
Published 2024-12-01“…Unlike traditional electronic attacks, it relies on manipulating individuals to run malware-infected devices or share sensitive information willingly. …”
Get full text
Article -
119
PROPOSALS FOR A BROADER APPROACH OF „MISUSE OF DEVICES AND PROGRAMS” PROVISION IN COMBATING CYBER-DEPENDENT AND CYBER-ENABLED CRIMES
Published 2024-05-01“…Taking into consideration the proliferation of illegal activities against personal information, confidential data or access credentials, especially the commercialization, especially in Dark Web, of codes, passwords, hacking tools, malware and other present or future cutting-edge system interference technologies, thus posing a great danger to the whole cyber-ecosystem, an improvement of art. 6, and of all the correspondent (related) articles in the special laws or the criminal codes adopted by the signatory countries, would contribute to the creation of an extensive and much comprehensive legal tool in the prevention and efficiently combating cybercrimes.…”
Get full text
Article -
120