-
21
BootBandit: A macOS bootloader attack
Published 2019-08-01“…Because traditional antivirus software runs within the operating system, the boot environment is difficult to protect from malware. …”
Get full text
Article -
22
Hybrid Optimization Enabled Robust CNN-LSTM Technique for Network Intrusion Detection
Published 2022-01-01“…An intrusion detection system (IDS) is a security device similar to other measures, including firewalls, antivirus software, and access control models devised to strengthen communication and information security. …”
Get full text
Article -
23
An Analysis of Conti Ransomware Leaked Source Codes
Published 2022-01-01“…These kinds of ransomware differ in their implementation and techniques, starting from how they spread, vulnerabilities they leverage, methods to hide their behaviors from antivirus software, encryption methods, and performance. …”
Get full text
Article -
24
Design and Implementation of an Automated Dynamic Rule System for Distributed Firewalls
Published 2023-08-01“…Zero-day vulnerabilities are undisclosed security flaws exploited by attackers to gain unauthorized access to vulnerable systems. Firewalls and antivirus software are essential for preventing intrusions. …”
Get full text
Article -
25
-
26
Web application scanning for malware attack detection with provide appropriate incident report by using hybrid method
Published 2019“…Nowadays, antivirus software is one of the ways to measure the increasing number of malware not only on the computer but also on the information system as well as the software that needs to be protected from any attacks. …”
Get full text
Thesis -
27
An algorithm based on artificial intelligence for solving information security tasks
Published 2023-01-01“…The development of antivirus software, intrusion detection and prevention systems does not fundamentally change the statistics on the number of attacks on enterprises. …”
Get full text
Article -
28
Dynamical Propagation Model of Malware for Cloud Computing Security
Published 2020-01-01“…Firstly, a dynamical propagation model is proposed to explore the important factors affecting the spread of malware, especially the impact of installing antivirus software in VMs. On this basis, a theoretical analysis for this model is investigated by means of differential dynamics, from which it is able to understand the dissemination behavior of malware under an infected cloud environment. …”
Get full text
Article -
29
Applying Bayesian probability for Android malware detection using permission features
Published 2021“…Various approaches have been applied to prevent malware spread, including firewalls, antivirus software and many more methods. Google has provided permission features as the main security to filter out the possibility of malware-infected Android mobile. …”
Get full text
Conference or Workshop Item -
30
Antivirus applied to JAR malware detection based on runtime behaviors
Published 2022-02-01“…The present work aims to create antivirus software with machine learning and artificial intelligence and master in Java malware detection. …”
Get full text
Article -
31
Cybersecurity Awareness and Training (CAT) Framework for Remote Working Employees
Published 2022-11-01“…For software and hardware systems protection, organizations tend to spend an excessive amount of money procuring intrusion detection systems, antivirus software, antispyware software, and encryption mechanisms. …”
Get full text
Article -
32
-
33
N/A and signature analysis for malwares detection and removal
Published 2019“…Methods/Statistical analysis: The rapid growth in the number and types of malware poses high security risks despite the numerous antivirus softwares with Signature-Based Detection (SBD) method. …”
Get full text
Article -
34
Patient Data Sharing and Confidentiality Practices of Researchers in Jordan
Published 2019-11-01“…The prevalence of researchers who “Always” used antivirus software and preserved patient’s information was 75.5% and 92.2%, respectively. …”
Get full text
Article -
35
Efficient Malware Analysis Using Subspace-Based Methods on Representative Image Patterns
Published 2023-01-01“…As signature-based detection is limited to known threats, sophisticated methods are needed to detect and classify emerging malware that can bypass traditional antivirus software. Using representative image patterns to analyze malware features can provide a more detailed and precise approach by revealing detailed patterns that may be missed otherwise. …”
Get full text
Article -
36
Bio-inspired framework for security in IoT devices
Published 2021“…DNA or proteins). In computing, antivirus software systems are adapted to detect and remove constantly changing software viruses. …”
Get full text
Conference or Workshop Item -
37
A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions
Published 2023-03-01“…Due to new-generation attacks and evasion techniques, traditional protection systems such as firewalls, intrusion detection systems, antivirus software, access control lists, etc., are no longer effective in detecting these sophisticated attacks. …”
Get full text
Article -
38
Novel Network Intrusion Detection Based on Feature Filtering Using FLAME and New Cuckoo Selection in a Genetic Algorithm
Published 2023-11-01“…To enhance network security, there are various approaches that can be employed, including the utilization of firewalls, encryption, and antivirus software. Among these methods, one type of system that can be implemented is an intrusion detection system (IDS), which actively monitors the network to identify any intrusions. …”
Get full text
Article -
39
Exploring Synergy of Blockchain and 6G Network for Industrial Automation
Published 2023-01-01“…Numerous established security measures, such as antivirus software, access control systems, intrusion detection systems (IDS), and intrusion prevention systems (IPS), have been identified in the literature as facing issues like centralized vulnerabilities, latency challenges, reliability issues, and single points of failure. …”
Get full text
Article -
40
Challenges of hidden data in the unused area two within executable files
Published 2009“…There are many challenges of hidden data in the unused area two within executable files, which is dependencies of the size of the cover file with the size of hidden information, differences of the size of file before and after the hiding process, availability of the cover file after the hiding process to perform normally and detection by antivirus software as a result of changes made to the file. …”
Get full text
Article