Maximizing accuracy in multi-scanner malware detection systems

MN Sakib, CT Huang, YD Lin - Computer Networks, 2020 - Elsevier
A variety of anti-malware scanners have been developed for malware detection. Previous
research has indicated that combining multiple different scanners can achieve better result …

Malicious software effect on the mobile devices power consumption

DA Maevsky, EJ Maevskaya, ED Stetsuyk… - Green IT Engineering …, 2017 - Springer
The computer programs, which provide malefactors with the data concerning the usage of
an infected mobile device can be referred to malicious software. As a rule, the information is …

[PDF][PDF] Recommendation mobile antivirus for Android smartphones based on malware detection

H Saputra, A Zahra, FFR Faldi… - Int J Artif …, 2024 - researchgate.net
The proliferation of smartphone malware attacks due to a lack of vigilance in app selection
raises serious concerns. Built-in smartphone security features often must be improved to …

Situational crime prevention

R Brewer, M de Vel-Palumbo, A Hutchings… - … Prevention: Theory and …, 2019 - Springer
This chapter examines a broad range of techniques known as situational crime prevention
(SCP). This form of intervention takes cues from a host of theoretical perspectives and …

Strength and Limitations of Publicly Available Anti-Malware Tools Against Obfuscated Malware

K Aswal, H Pathak, N Singh… - 2023 5th International …, 2023 - ieeexplore.ieee.org
Many industries, including the automobile industry, have seen inventive development in
various application areas as a result of the Internet revolution. Autonomous vehicles aren't …

[BOOK][B] Evidence-based Cybersecurity: Foundations, Research, and Practice

PL Pomerleau, D Maimon - 2022 - taylorfrancis.com
The prevalence of cyber-dependent crimes and illegal activities that can only be performed
using a computer, computer networks, or other forms of information communication …

Factors Influencing Generation Z's Cybersecurity Practices: An Empirical Analysis

E Slamet, Z Ruhwanya - … Conference on Implications of Information and …, 2024 - Springer
With Generation Z's rise in technology use, recognising their specific cybersecurity risks is
vital. Adopting effective cybersecurity practices is essential for their protection, yet the factors …

Relevance of Evidence-Based Cybersecurity in Guiding the Financial Sector's and Efforts in Fighting Cybercrime

PL Pomerleau, DL Lowery, D Maimon - Countering Cyber Threats to …, 2020 - Springer
Evidence-based cybersecurity is an approach aiming to support security professionals' and
policymakers' decision-making processes regarding the deployment of security policies and …

Selection the perimeter protection equipment in security systems

H Tun, S Lupin, HH Linn, KNZ Lin - 2018 IEEE Conference of …, 2018 - ieeexplore.ieee.org
Information systems are being developed rapidly nowadays. The biggest challenge for all
organizations is to find the best way to protect important information of an organization. So …

Pålogga politi-En studie av muligheter og utfordringer med digitalt forebyggende politiarbeid

H Walquist - 2021 - duo.uio.no
Digitaliseringen av samfunnet har skapt både utfordringer, men også muligheter for politiet.
Internett har gitt opphav til nye former for kriminalitet, og økt rekkevidde og muligheter for …