Ransomware detection using the dynamic analysis and machine learning: A survey and research directions
Ransomware is an ill-famed malware that has received recognition because of its lethal and
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …
irrevocable effects on its victims. The irreparable loss caused due to ransomware requires …
[HTML][HTML] Comparative analysis of blockchain technology to support digital transformation in ports and ship**
Blockchain is one of the technologies that can support digital transformation in industries in
many aspects. This sophisticated technology can provide a decentralized, transparent, and …
many aspects. This sophisticated technology can provide a decentralized, transparent, and …
Image-based malware classification using VGG19 network and spatial convolutional attention
In recent years the amount of malware spreading through the internet and infecting
computers and other communication devices has tremendously increased. To date …
computers and other communication devices has tremendously increased. To date …
Anomaly detection framework to prevent DDoS attack in fog empowered IoT networks
Internet of things or in short IoT is a network of interconnected entities such as computing
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …
devices, mechanical machines, digital gadgets etc. Cloud based IoT infrastructures are …
An improved mutual information feature selection technique for intrusion detection systems in the Internet of Medical Things
In healthcare, the Internet of Things (IoT) is used to remotely monitor patients and provide
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …
real-time diagnoses, which is referred to as the Internet of Medical Things (IoMT). This …
Quantum Mayfly optimization with encoder-decoder driven LSTM networks for malware detection and classification model
Malware refers to malicious software developed to penetrate or damage a computer system
without any owner's informed consent. It uses target system susceptibilities, like bugs in …
without any owner's informed consent. It uses target system susceptibilities, like bugs in …
Mitigating the risks of malware attacks with deep Learning techniques
Malware has become increasingly prevalent in recent years, endangering people,
businesses, and digital assets worldwide. Despite the numerous techniques and …
businesses, and digital assets worldwide. Despite the numerous techniques and …
Tree-based machine learning algorithms in the Internet of Things environment for multivariate flood status prediction
Floods are one of the most common natural disasters in the world that affect all aspects of
life, including human beings, agriculture, industry, and education. Research for develo** …
life, including human beings, agriculture, industry, and education. Research for develo** …
Application layer security for internet communications: A comprehensive review, challenges, and future trends
The security of Internet communications has traditionally been delegated to controls at lower
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
layers of the Transmission Control Protocol/Internet Protocol (TCP/IP) architecture. However …
Survey of Techniques on Data Leakage Protection and Methods to address the Insider threat
Data leakage is a problem that companies and organizations face every day around the
world. Mainly the data leak caused by the internal threat posed by authorized personnel to …
world. Mainly the data leak caused by the internal threat posed by authorized personnel to …