Zobrazeno 1 - 10
of 305
pro vyhledávání: '"malicious software"'
Autor:
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 4, Pp 87-98 (2024)
This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment
Externí odkaz:
https://doaj.org/article/47fef815825e4662bf493c0e8bf2b7e4
Autor:
Kaithal Praveen Kumar, Sharma Varsha
Publikováno v:
Cybernetics and Information Technologies, Vol 24, Iss 2, Pp 142-155 (2024)
Malware remains a big threat to cyber security, calling for machine learning-based malware detection. Malware variations exhibit common behavioral patterns indicative of their source and intended use to enhance the existing framework’s usefulness.
Externí odkaz:
https://doaj.org/article/f54bd2c983354aecae730e646b76c9e0
Autor:
Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Publikováno v:
Безопасность информационных технологий, Vol 31, Iss 2, Pp 42-50 (2024)
The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the
Externí odkaz:
https://doaj.org/article/5d05eb6260e84008b3aaf889e0f0b63a
Publikováno v:
Cyber Security and Applications, Vol 1, Iss , Pp 100014- (2023)
Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. However, the rapid increase in the smartphone pene
Externí odkaz:
https://doaj.org/article/d1d2afdcddae4005ba6ca919ee04d2e2
Autor:
Alexey V. Astrakhov, Alexander N. Stadnik, Kirill S. Skryl, Ivan I. Korovin, Elvira R. Bashaeva
Publikováno v:
Безопасность информационных технологий, Vol 30, Iss 1, Pp 70-80 (2023)
The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of pro
Externí odkaz:
https://doaj.org/article/8c592a8f954c403cb5d3efbf6b9be0c6
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 8, Pp 5456-5467 (2022)
Software updates are highly significant in autonomous vehicles. These updates are utilized to provide enhanced features and updated security mechanisms. In order to ensure scalability and smooth roll-out Over-the-air (OTA) mechanism is a preferred op
Externí odkaz:
https://doaj.org/article/45cbd3bbfb5a44888e33e79f97794ed9
Publikováno v:
International Journal of Information Security and Cybercrime (IJISC). 10(2):51-74
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=1005797
Publikováno v:
Mathematics, Vol 11, Iss 1, p 249 (2023)
Ransomware is malicious software that encrypts data before demanding payment to unlock them. The majority of ransomware variants use nearly identical command and control (C&C) servers but with minor upgrades. There are numerous variations of ransomwa
Externí odkaz:
https://doaj.org/article/a7d9aa720cea47e98e72e7b4a7cc3079
Autor:
Marcinauskaitė, Renata
Publikováno v:
Jurisprudencija / Jurisprudence. 26(2):352-369
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=829242