File-based malware has long been among the most effective attack vectors employed by threat actors worldwide. While ...
In a groundbreaking study published in BME Frontiers, researchers from the University of California, Los Angeles (UCLA), in ...
A new family of Android click-fraud trojans leverages TensorFlow machine learning models to automatically detect and interact with specific advertisement elements. The mechanism relies on visual ...
ABSTRACT: The research aim is to develop an intelligent agent for cybersecurity systems capable of detecting abnormal user behavior using deep learning methods and ensuring interpretability of ...
Researchers at Google’s Threat Intelligence Group (GTIG) have discovered that hackers are creating malware that can harness the power of large language models (LLMs) to rewrite itself on the fly. An ...
A new Android malware family, Herodotus, uses random delay injection in its input routines to mimic human behavior on mobile devices and evade timing-based detection by security software. Herodotus, ...
Abstract: Malware continues to pose a serious threat to cybersecurity, especially with the rise of unknown or zero day attacks that bypass the traditional antivirus tools. This study proposes a hybrid ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results