Towards a hybrid immune algorithm based on danger theory for database security
In Databases, the most prevalent cause of data breaches comes from insiders who misuse
their account privileges. Due to the difficulty of discovering such breaches, an adaptive …
their account privileges. Due to the difficulty of discovering such breaches, an adaptive …
Malware detection in android system based on change perception
H Zhang, H Yang, F Yang, W Jiang - … 2019, Nanchang, China, August 3–6 …, 2019 - Springer
The existing detection methods of Android mobile malware mainly include signature
scanning, heuristic method and behavior monitoring method. These traditional detection …
scanning, heuristic method and behavior monitoring method. These traditional detection …