Maximizing accuracy in multi-scanner malware detection systems
A variety of anti-malware scanners have been developed for malware detection. Previous
research has indicated that combining multiple different scanners can achieve better result …
research has indicated that combining multiple different scanners can achieve better result …
Malicious software effect on the mobile devices power consumption
DA Maevsky, EJ Maevskaya, ED Stetsuyk… - Green IT Engineering …, 2017 - Springer
The computer programs, which provide malefactors with the data concerning the usage of
an infected mobile device can be referred to malicious software. As a rule, the information is …
an infected mobile device can be referred to malicious software. As a rule, the information is …
[PDF][PDF] Recommendation mobile antivirus for Android smartphones based on malware detection
The proliferation of smartphone malware attacks due to a lack of vigilance in app selection
raises serious concerns. Built-in smartphone security features often must be improved to …
raises serious concerns. Built-in smartphone security features often must be improved to …
Situational crime prevention
This chapter examines a broad range of techniques known as situational crime prevention
(SCP). This form of intervention takes cues from a host of theoretical perspectives and …
(SCP). This form of intervention takes cues from a host of theoretical perspectives and …
Strength and Limitations of Publicly Available Anti-Malware Tools Against Obfuscated Malware
Many industries, including the automobile industry, have seen inventive development in
various application areas as a result of the Internet revolution. Autonomous vehicles aren't …
various application areas as a result of the Internet revolution. Autonomous vehicles aren't …
[BOOK][B] Evidence-based Cybersecurity: Foundations, Research, and Practice
PL Pomerleau, D Maimon - 2022 - taylorfrancis.com
The prevalence of cyber-dependent crimes and illegal activities that can only be performed
using a computer, computer networks, or other forms of information communication …
using a computer, computer networks, or other forms of information communication …
Factors Influencing Generation Z's Cybersecurity Practices: An Empirical Analysis
E Slamet, Z Ruhwanya - … Conference on Implications of Information and …, 2024 - Springer
With Generation Z's rise in technology use, recognising their specific cybersecurity risks is
vital. Adopting effective cybersecurity practices is essential for their protection, yet the factors …
vital. Adopting effective cybersecurity practices is essential for their protection, yet the factors …
Relevance of Evidence-Based Cybersecurity in Guiding the Financial Sector's and Efforts in Fighting Cybercrime
PL Pomerleau, DL Lowery, D Maimon - Countering Cyber Threats to …, 2020 - Springer
Evidence-based cybersecurity is an approach aiming to support security professionals' and
policymakers' decision-making processes regarding the deployment of security policies and …
policymakers' decision-making processes regarding the deployment of security policies and …
Selection the perimeter protection equipment in security systems
Information systems are being developed rapidly nowadays. The biggest challenge for all
organizations is to find the best way to protect important information of an organization. So …
organizations is to find the best way to protect important information of an organization. So …
Pålogga politi-En studie av muligheter og utfordringer med digitalt forebyggende politiarbeid
H Walquist - 2021 - duo.uio.no
Digitaliseringen av samfunnet har skapt både utfordringer, men også muligheter for politiet.
Internett har gitt opphav til nye former for kriminalitet, og økt rekkevidde og muligheter for …
Internett har gitt opphav til nye former for kriminalitet, og økt rekkevidde og muligheter for …