Cyber security threats, vulnerabilities, and security solutions models in banking

D Ghelani, TK Hua, SKR Koduru - Authorea Preprints, 2022 - authorea.com
We live in a time when data security has become a significant concern. Cyber services are
the most enjoyable and time-saving aspects of one's life. On the other hand, people save …

Cybersecurity for autonomous vehicles against malware attacks in smart-cities

S Aurangzeb, M Aleem, MT Khan, H Anwar… - Cluster …, 2024 - Springer
Abstract Smart Autonomous Vehicles (AVSs) are networks of Cyber-Physical Systems
(CPSs) in which they wirelessly communicate with other CPSs sub-systems (eg, smart …

[PDF][PDF] Digital Educational Coordination System (DECS)

D Ghelani - 2022 - researchgate.net
The physical classroom learning nowadays is no longer applicable for the current younger
generations (Gen Y). Internet and distance learning which is generally known as online …

Defending IoT Devices against Bluetooth Worms with Bluetooth OBEX Proxy

FH Hsu, MH Wu, YL Hwang, JX Chen, JH Huang… - Information, 2023 - mdpi.com
The number of Internet of Things (IoT) devices has increased dramatically in recent years,
and Bluetooth technology is critical for communication between IoT devices. It is possible to …

State-based sandbox tool for distributed malware detection with avoid techniques

P Rehida, G Markowsky, A Sachenko… - 2023 13th …, 2023 - ieeexplore.ieee.org
This paper deals with the problem of detecting the malware by using emulation approach.
Modern malware include various avoid techniques, to hide its anomaly actions. Advantages …

A Malicious Program Behavior Detection Model Based on API Call Sequences

N Li, Z Lu, Y Ma, Y Chen, J Dong - Electronics, 2024 - mdpi.com
To address the issue of low accuracy in detecting malicious program behaviors in new
power system edge-side applications, we present a detection model based on API call …

Hybrid Feature Selection Technique to classify Malicious Applications using Machine Learning approach

U Nikam, VM Deshmukh - Journal of Integrated Science and …, 2024 - pubs.thesciencein.org
The malware identification is crucial factor in secure uses of mobile phones. A method for
malware classification utilizing hybrid features is described in this study. This method selects …

[PDF][PDF] Origin, taxonomy, and benefits of Syzygium aromaticum

S Khan - Authorea Preprints, 2022 - authorea.com
Caryophyllus, Caryophyllus aromaticus, Eugenia caryophyllus and Caryophyllus silvestris.
The name of clove is derived from French word 'clou'and 'clove', meaning 'nail'. Clove is …

A Novel Approach to Android Malware Intrusion Detection Using Zero-Shot Learning GANs

SAR Shirazi, M Shaikh - Sir Syed University Research …, 2023 - sirsyeduniversity.edu.pk
This study proposes an innovative intrusion detection system for Android malware based on
a zero-shot learning GAN approach. Our system achieved an accuracy of 99.99%, indicating …

Phytochemical screening

S KHAN - Authorea Preprints, 2022 - authorea.com
Along the sides of the test tubes few drops of Wagner reagent were added into few drops of
filtrate, brown-reddish precipitate specifies occurrence of alkaloids. 3.4. 2. Test for …