Zobrazeno 1 - 10
of 28
pro vyhledávání: '"Julio Hernandez-Castro"'
Publikováno v:
Journal of Universal Computer Science, Vol 30, Iss 9, Pp 1163-1183 (2024)
Web services play an important role in our daily lives. They are used in a wide range of activities, from online banking and shopping to education, entertainment and social interactions. Therefore, it is essential to ensure that they are kept as secu
Externí odkaz:
https://doaj.org/article/24bc4b7e34f2411b93654ec6f22c86df
Publikováno v:
IEEE Access, Vol 10, Pp 35172-35218 (2022)
The increasing dominance of Android smartphones for everyday communication and data processing makes long-term stealthy malware an even more dangerous threat. Recent malware campaigns like Flubot demonstrate that by employing stealthy malware techniq
Externí odkaz:
https://doaj.org/article/5c05ae3a568841c890bee131202ea10e
Publikováno v:
IEEE Access, Vol 9, Pp 168600-168612 (2021)
The security of financial apps on smartphones is threatened by a class of advanced and persistent malware that can bypass all existing security measures. Strong cryptography and trusted on-chip hardware modules are powerless against sophisticated att
Externí odkaz:
https://doaj.org/article/eb9a71c6188142e1993dbbd9ece9287c
Autor:
Elena Almaraz Luengo, Marcos Brian Leiva Cerna, Luis Javier García Villalba, Julio Hernandez-Castro, Darren Hurley-Smith
Publikováno v:
Entropy, Vol 24, Iss 5, p 613 (2022)
This work presents an analysis of the existing dependencies between the tests of the FIPS 140-2 battery. Two main analytical approaches are utilized, the first being a study of correlations through the Pearson’s correlation coefficient that detects
Externí odkaz:
https://doaj.org/article/10c6851230d740f6a79365a794d8ed81
Publikováno v:
IEEE Access, Vol 6, Pp 57205-57218 (2018)
Android malware is increasing in spread and complexity. Advanced obfuscation, emulation detection, delayed payload activation or dynamic code loading are some of the techniques employed by the current malware to hinder the use of reverse engineering
Externí odkaz:
https://doaj.org/article/31d80281f5b24a858b7dd8bdf2d80cb2
Publikováno v:
PLoS ONE, Vol 13, Iss 4, p e0195737 (2018)
This paper tries to tackle the modern challenge of practical steganalysis over large data by presenting a novel approach whose aim is to perform with perfect accuracy and in a completely automatic manner. The objective is to detect changes introduced
Externí odkaz:
https://doaj.org/article/e7ddeef95b074e8ab4012a635d0eb7ff
Autor:
Ana Lucila Sandoval Orozco, Luis Javier García Villalba, David Manuel Arenas González, Jocelin Rosales Corripio, Julio Hernandez‐Castro, Stuart James Gibson
Publikováno v:
IET Computer Vision, Vol 9, Iss 5, Pp 723-731 (2015)
The forensic analysis of digital images from mobile devices is particularly important given their quick expansion and everyday use in the society. A further consequence of digital images' widespread use is that they are used today as silent witnesses
Externí odkaz:
https://doaj.org/article/90d1bb7b92954cd7969252f0f8d480f4
Autor:
Esteban Alejandro Armas Vega, Ana Lucila Sandoval Orozco, Luis Javier García Villalba, Julio Hernandez-Castro
Publikováno v:
Sensors, Vol 18, Iss 10, p 3372 (2018)
In the last few years, the world has witnessed a ground-breaking growth in the use of digital images and their applications in the modern society. In addition, image editing applications have downplayed the modification of digital photos and this com
Externí odkaz:
https://doaj.org/article/78afe415d5ae44ef8f76aa7e946f64d6
Autor:
Edgar González Fernández, Ana Lucila Sandoval Orozco, Luis Javier García Villalba, Julio Hernandez-Castro
Publikováno v:
Sensors, Vol 18, Iss 9, p 2804 (2018)
Existence of mobile devices with high performance cameras and powerful image processing applications eases the alteration of digital images for malicious purposes. This work presents a new approach to detect digital image tamper detection technique b
Externí odkaz:
https://doaj.org/article/41c0d86d6ffd4339af8c8091e06af722
Publikováno v:
PeerJ Computer Science, Vol 1, p e10 (2015)
In this work, we developed an automated system to detect potentially illegal elephant ivory items for sale on eBay. Two law enforcement experts, with specific knowledge of elephant ivory identification, manually classified items on sale in the Antiqu
Externí odkaz:
https://doaj.org/article/27297717520a427ea04469419ed6d8b3