Improved diagnosis of Parkinson's disease using optimized crow search algorithm

D Gupta, S Sundaram, A Khanna, AE Hassanien… - Computers & Electrical …, 2018 - Elsevier
Diagnosis of Parkinson's disease at its early stage is important in proper treatment of the
patients so they can lead productive lives for as long as possible. Although many techniques …

Evodeep: a new evolutionary approach for automatic deep neural networks parametrisation

A Martín, R Lara-Cabrera, F Fuentes-Hurtado… - Journal of Parallel and …, 2018 - Elsevier
Abstract Deep Neural Networks (DNN) have become a powerful, and extremely popular
mechanism, which has been widely used to solve problems of varied complexity, due to their …

MOCDroid: multi-objective evolutionary classifier for Android malware detection

A Martín, HD Menéndez, D Camacho - Soft Computing, 2017 - Springer
Malware threats are growing, while at the same time, concealment strategies are being used
to make them undetectable for current commercial antivirus. Android is one of the target …

A short review for ransomware: pros and cons

HA Shakir, AN Jaber - Advances on P2P, Parallel, Grid, Cloud and …, 2018 - Springer
Recently, the software virus Ransomware spread like a cyclone wind. As a cyclone wind
creates atmospheric instability, Ransomware similarly creates computer data instability …

Evolving deep neural networks architectures for android malware classification

A Martín, F Fuentes-Hurtado, V Naranjo… - 2017 IEEE Congress …, 2017 - ieeexplore.ieee.org
Deep Neural Networks (DNN) have become a powerful, widely used, and successful
mechanism to solve problems of different nature and varied complexity. Their ability to build …

[PDF][PDF] Clustering analysis for malware behavior detection using registry data

NA Rosli, W Yassin, MA Faizal… - International Journal of …, 2019 - academia.edu
The increase of malware attacks may increase risk in information technology industry such
as Industrial Revolution 4.0 that consists of multiple sectors especially in cyber security …

An in-depth study of the jisut family of android ransomware

A Martín, J Hernandez-Castro, D Camacho - IEEE Access, 2018 - ieeexplore.ieee.org
Android malware is increasing in spread and complexity. Advanced obfuscation, emulation
detection, delayed payload activation or dynamic code loading are some of the techniques …

Evolutionary computation and machine learning in security

S Picek, D Jakobovic - Proceedings of the Genetic and Evolutionary …, 2022 - dl.acm.org
Stjepan Picek received his PhD in 2015 as a double doctorate under the supervision of Lejla
Batina, Elena Marchiori (Radboud University Nijmegen, The Netherlands), and Domagoj …

Nowhere metamorphic malware can hide-a biological evolution inspired detection scheme

KO Babaagba, Z Tan, E Hart - … on Dependability in Sensor, Cloud, and Big …, 2019 - Springer
The ability to detect metamorphic malware has generated significant research interest over
recent years, particularly given its proliferation on mobile devices. Such malware is …

Structural characterization of titanium-doped Bioglass using isotopic substitution neutron diffraction

RA Martin, RM Moss, NJ Lakhkar… - Physical Chemistry …, 2012 - pubs.rsc.org
Melt quenched silicate glasses containing calcium, phosphorus and alkali metals have the
ability to promote bone regeneration and to fuse to living bone. Of these glasses 45S5 …