A survey on hardware-based malware detection approaches

CP Chenet, A Savino, S Di Carlo - IEEE Access, 2024 - ieeexplore.ieee.org
This paper delves into the dynamic landscape of computer security, where malware poses a
paramount threat. Our focus is a riveting exploration of the recent and promising hardware …

Validation of cyber security behaviour among adolescents at Malaysia university: Revisiting gender as a role

TT Ting, KM Cheah, JX Khiew, YC Lee… - International Journal of …, 2024 - ijirss.com
Cyber-attacks and crimes are still a problem in Malaysia. COVID-19 has pushed Malaysians
into the digital world more quickly. These cyberattacks may rise and affect more people …

Benchmarking Android Malware Analysis Tools

J Bermejo Higuera, J Morales Moreno… - Electronics, 2024 - mdpi.com
Today, malware is arguably one of the biggest challenges organisations face from a
cybersecurity standpoint, regardless of the types of devices used in the organisation. One of …

Encrypting the Unseen: Exploring Steganography Techniques in HTTP Environments

AP Joshi, N Kaur, S Chauhan - 2024 11th International …, 2024 - ieeexplore.ieee.org
The skill of secret communication, known as steganography, has developed in step with the
growing reliance on digital channels for information sharing. This study explores the …

[PDF][PDF] Overview and Classification of Social Security Attacks using Online Social Networking for Rumour Blocking

MSM Mohod, A Iqbal - Recent Advancements in Science and Technology, 2024 - vbmv.org
The online social networking providers destine to secure their users; but the intruders and
attackers are able to outsmart the security measures by exploiting user's privacy, identity and …