The rise of “malware”: Bibliometric analysis of malware study
Malicious software (malware) is a computer program designed to create harmful and
undesirable effects. It considered as one of the many dangerous threats for Internet users …
undesirable effects. It considered as one of the many dangerous threats for Internet users …
Information security policy compliance model in organizations
The Internet and information technology have influenced human life significantly. However,
information security is still an important concern for both users and organizations …
information security is still an important concern for both users and organizations …
Information security conscious care behaviour formation in organizations
Today, the Internet can be considered to be a basic commodity, similar to electricity, without
which many businesses simply cannot operate. However, information security for both …
which many businesses simply cannot operate. However, information security for both …
Detection of online phishing email using dynamic evolving neural network based on reinforcement learning
Despite state-of-the-art solutions to detect phishing attacks, there is still a lack of accuracy for
the detection systems in the online mode which is leading to loopholes in web-based …
the detection systems in the online mode which is leading to loopholes in web-based …
Information security applications in smart cities: A bibliometric analysis of emerging research
This paper aims to analyze the intellectual structure and research fronts in application
information security in smart cities to identify research boundaries, trends, and new …
information security in smart cities to identify research boundaries, trends, and new …
Cybersecurity risk analysis model using fault tree analysis and fuzzy decision theory
Cybersecurity, which is defined as information security aimed at averting cyberattacks, which
are among the main issues caused by the extensive use of networks in industrial control …
are among the main issues caused by the extensive use of networks in industrial control …
Human aspects of information security in organisations
Information is core to the well-being of any modern-day organisation. In order to satisfactorily
protect this important asset, human, organisational and technological aspects play a core …
protect this important asset, human, organisational and technological aspects play a core …
Towards measuring and mitigating social engineering software download attacks
Most modern malware infections happen through the browser, typically as the result of a
drive-by or social engineering attack. While there have been numerous studies on …
drive-by or social engineering attack. While there have been numerous studies on …
Antiviruses under the microscope: A hands-on perspective
AntiViruses (AVs) are the main defense line against attacks for most users and much
research has been done about them, especially proposing new detection procedures that …
research has been done about them, especially proposing new detection procedures that …
A novel pattern recognition system for detecting Android malware by analyzing suspicious boot sequences
This paper introduces a malware detection system for smartphones based on studying the
dynamic behavior of suspicious applications. The main goal is to prevent the installation of …
dynamic behavior of suspicious applications. The main goal is to prevent the installation of …