Deep Learning Based Hybrid Analysis of Malware Detection and Classification: A Recent Review.
J. Cyber Secur. Mobil., 2024
Android malware detection using PMCC heatmap and Fuzzy Unordered Rule Induction Algorithm (FURIA).
J. Intell. Fuzzy Syst., 2023
Machine Learning Technique for Phishing Website Detection.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023
Factors Affecting Cyberbullying Behaviours Among University Students: A Review.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023
CAGDEEP: Mobile Malware Analysis Using Force Atlas 2 with Strong Gravity Call Graph And Deep Learning.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023
Robust Image Watermarking Using Hessenberg Decomposition and SVD with Integer Wavelet Transform.
Proceedings of the 8th IEEE International Conference On Software Engineering and Computer Systems, 2023
A Bayesian probability model for Android malware detection.
ICT Express, 2022
The Summer Heat of Cryptojacking Season: Detecting Cryptojacking using Heatmap and Fuzzy.
Proceedings of the 2022 International Conference on Cyber Resilience (ICCR), 2022
Towards a systematic description of the field using bibliometric analysis: malware evolution.
Scientometrics, 2021
Malware detection using static analysis in Android: a review of FeCO (features, classification, and obfuscation).
PeerJ Comput. Sci., 2021
The rise of software vulnerability: Taxonomy of software vulnerabilities detection and machine learning approaches.
J. Netw. Comput. Appl., 2021
Android mobile malware detection using fuzzy AHP.
J. Inf. Secur. Appl., 2021
Survey of File Carving Techniques.
Proceedings of the Innovative Systems for Intelligent Health Informatics, 2020
The rise of "blockchain": bibliometric analysis of blockchain study.
Scientometrics, 2019
Solving 0/1 Knapsack Problem using Opposition-based Whale Optimization Algorithm (OWOA).
Proceedings of the 8th International Conference on Software and Computer Applications, 2019
Bio-inspired computational paradigm for feature investigation and malware detection: interactive analytics.
Multim. Tools Appl., 2018
Discovering optimal features using static analysis and a genetic search based method for Android malware detection.
Frontiers Inf. Technol. Electron. Eng., 2018
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management.
J. Medical Syst., 2018
Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario.
IEEE Access, 2018
The rise of "malware": Bibliometric analysis of malware study.
J. Netw. Comput. Appl., 2016