The rise of “malware”: Bibliometric analysis of malware study

MF Ab Razak, NB Anuar, R Salleh, A Firdaus - Journal of Network and …, 2016 - Elsevier
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …

Information security policy compliance model in organizations

NS Safa, R Von Solms, S Furnell - computers & security, 2016 - Elsevier
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …

Information security conscious care behaviour formation in organizations

NS Safa, M Sookhak, R Von Solms, S Furnell… - Computers & …, 2015 - Elsevier
Today, the Internet can be considered to be a basic commodity, similar to electricity, without
which many businesses simply cannot operate. However, information security for both …

Detection of online phishing email using dynamic evolving neural network based on reinforcement learning

S Smadi, N Aslam, L Zhang - Decision Support Systems, 2018 - Elsevier
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …

Information security applications in smart cities: A bibliometric analysis of emerging research

T Poleto, TCC Nepomuceno, VDH De Carvalho… - Future Internet, 2023 - mdpi.com
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …

Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory

APH de Gusmão, MM Silva, T Poleto, LC e Silva… - International Journal of …, 2018 - Elsevier
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …

Human aspects of information security in organisations

NS Safa, R Von Solms, L Futcher - Computer Fraud & Security, 2016 - Elsevier
Information is core to the well-being of any modern-day organisation. In order to satisfactorily
protect this important asset, human, organisational and technological aspects play a core …

Towards measuring and mitigating social engineering software download attacks

T Nelms, R Perdisci, M Antonakakis… - 25th USENIX Security …, 2016 - usenix.org
Most modern malware infections happen through the browser, typically as the result of a
drive-by or social engineering attack. While there have been numerous studies on …

Antiviruses under the microscope: A hands-on perspective

M Botacin, FD Domingues, F Ceschin, R Machnicki… - Computers & …, 2022 - Elsevier
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …

A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences

JM Vidal, MAS Monge, LJG Villalba - Knowledge-Based Systems, 2018 - Elsevier
This paper introduces a malware detection system for smartphones based on studying the
dynamic behavior of suspicious applications. The main goal is to prevent the installation of …