Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions

K Ansar, M Ahmed, M Helfert, J Kim - Mathematics, 2023 - mdpi.com
In cybersecurity, personal data breaches have become one of the significant issues. This
fact indicates that data breaches require unique detection systems, techniques, and …

Deep learning-powered malware detection in cyberspace: a contemporary review

A Redhu, P Choudhary, K Srinivasan, TK Das - Frontiers in Physics, 2024 - frontiersin.org
This article explores deep learning models in the field of malware detection in cyberspace,
aiming to provide insights into their relevance and contributions. The primary objective of the …

Stacked Ensemble Deep Learning for Outdoor Insulator Surface Condition Classification: A Profound Study on Water Droplets

A Serikbay, M Bagheri, A Zollanvari - IEEE Access, 2023 - ieeexplore.ieee.org
Insulators are vital protection and isolation barriers used in power transmission systems. To
prevent unexpected failures caused by severe weather conditions, it is important to develop …

vDefender: An explainable and introspection-based approach for identifying emerging malware behaviour at hypervisor-layer in virtualization environment

A Gaur, P Mishra, P Vinod, A Singh… - Computers and …, 2024 - Elsevier
Virtualization can be defined as the backbone of cloud computing services, which has
gathered significant attention from organizations and users. Due to the increasing number of …

[HTML][HTML] Earthworm Optimization Algorithm Based Cascade LSTM-GRU Model for Android Malware Detection

BB Gupta, A Gaurav, V Arya, S Bansal, RW Attar… - Cyber Security and …, 2025 - Elsevier
The rise in mobile malware risks brought on by the explosion of Android smartphones
required more efficient detection techniques. Inspired by a cascade of Long Short-Term …

Protecting Android Devices from Malware Attacks: A State-of-the-Art Report of Concepts, Modern Learning Models and Challenges

EC Bayazit, OK Sahingoz, B Dogan - IEEE Access, 2023 - ieeexplore.ieee.org
Advancements in microelectronics have increased the popularity of mobile devices like
cellphones, tablets, e-readers, and PDAs. Android, with its open-source platform, broad …

Model for Technology Risk Assessment in Commercial Banks

W Kang, CF Cheung - Risks, 2024 - mdpi.com
As the complexity of banking technology systems increases, the prevention of technological
risk becomes an endless battle. Currently, most banks rely on the experience and subjective …

Hybrid image denoising based dehazing with central difference embedding convoluted generative adversarial network for poor visibility scenarios

A More, SL Lahudkar - International Journal of Image and Data …, 2024 - Taylor & Francis
In image dehazing, non-uniform haze leads to issues such as image blurring, distortion, low
contrast, and surface detail loss. Existing dehazing techniques struggle with the uneven …

Binary Malware Detection via Heterogeneous Information Deep Ensemble Learning

R Song, L Li, L Cui, Q Liu, J Gao - 2023 IEEE 29th International …, 2023 - ieeexplore.ieee.org
Dynamic malware detection refers to detecting mal-ware by inferring the run-time trace of
malware, ie, a sequence of API calls. In this paper, we proposed HeteroNet, a novel dynamic …

[PDF][PDF] Innovative Malware Detection: Practical Swarm Optimization and fuzzyKNN Model in Honeypot Environment.

H Othman, MA Alhija, MA Al Sharaiah - … of Advances in Soft Computing & …, 2024 - i-csrs.org
Effective malware detection remains a critical challenge in cybersecurity. In this study, we
propose an innovative method that combines swarm intelligence through Particle Swarm …