Towards a hybrid immune algorithm based on danger theory for database security

W Said, AM Mostafa - IEEE Access, 2020 - ieeexplore.ieee.org
In Databases, the most prevalent cause of data breaches comes from insiders who misuse
their account privileges. Due to the difficulty of discovering such breaches, an adaptive …

Malware detection in android system based on change perception

H Zhang, H Yang, F Yang, W Jiang - … 2019, Nanchang, China, August 3–6 …, 2019 - Springer
The existing detection methods of Android mobile malware mainly include signature
scanning, heuristic method and behavior monitoring method. These traditional detection …