Zobrazeno 1 - 10
of 952
pro vyhledávání: '"Evasion (network security)"'
Publikováno v:
Transport Policy. 129:117-136
The governmental subsidy is an important instrument for catalyzing the early adoption of Electric Vehicles (EVs)}. A sustainable subsidy policy must balance between promoting EVs and expanding the charging infrastructure. This paper proposes a dynami
Publikováno v:
IEEE Transactions on Computers. 71:2872-2887
Hardware Malware Detectors (HMDs) have recently been proposed to make systems more malware-resistant. HMDs use hardware features to detect malware as a computational anomaly. Several aspects of the detector construction have been explored, leading to
Publikováno v:
IEEE Transactions on Dependable and Secure Computing. 19:3357-3370
Machine learning (ML) has been widely used for malware detection on different operating systems, including Android. To keep up with malware's evolution, the detection models usually need to be retrained periodically (e.g., every month) based on the d
Autor:
Asaf Shabtai, Moshe Kravchik
Publikováno v:
IEEE Transactions on Dependable and Secure Computing
Industrial control systems (ICSs) are widely used and vital to industry and society. Their failure can have severe impact on both economics and human life. Hence, these systems have become an attractive target for attacks, both physical and cyber. A
Autor:
Maizels, Rick M.
Publikováno v:
Expert Review of Vaccines
article-version (VoR) Version of Record
article-version (VoR) Version of Record
Introduction: Human infections with helminth worm parasites are extraordinarily prevalent across tropical and subtropical parts of the world, and control relies primarily on drugs that offer short-term suppression of infection. There is an urgent nee
Publikováno v:
IEEE Transactions on Vehicular Technology. 70:11324-11337
An electronic toll collection (ETC) system is one of the most important parts of an intelligent transportation system (ITS), but existing ETC systems are not efficient and have vehicle fee evasion complications. Owing to the traceability and tamper r
Publikováno v:
Journal of Parallel and Distributed Computing. 156:25-37
Nowadays smartphones become an indispensable tool in many people's everyday life that makes themselves attractive targets for attackers. Among various malware targeting at smartphones, SMS-based malware is one of the most notorious ones. Though a num
Autor:
József Lengyel
Publikováno v:
Honvédségi Szemle. 149:86-100
A túlélés, elkerülés, ellenállás, kiemelés (SERE2) témakörében folyó kiképzéseknek az egész Magyar Honvédségre kiterjedő magas szakmai szintű megvalósulása fokozza az állomány magabiztos feladat-végrehajtását, növelve ezzel
Autor:
A. Al-Marghilani
Publikováno v:
Engineering, Technology & Applied Science Research, Vol 11, Iss 4 (2021)
Malware detection in Internet of Things (IoT) devices is a great challenge, as these devices lack certain characteristics such as homogeneity and security. Malware is malicious software that affects a system as it can steal sensitive information, slo
Publikováno v:
ACM Computing Surveys. 54:1-36
Ransomware remains an alarming threat in the 21st century. It has evolved from being a simple scare tactic into a complex malware capable of evasion. Formerly, end-users were targeted via mass infection campaigns. Nevertheless, in recent years, the a