REVIEW
|
doi:10.20944/preprints202402.0551.v1
Subject:
Engineering,
Aerospace Engineering
Keywords:
counter-UAS; drone threat; unmanned aircraft system; malicious drone
Online: 9 February 2024 (10:52:53 CET)
ARTICLE
|
doi:10.20944/preprints201901.0030.v1
Subject:
Computer Science And Mathematics,
Computer Science
Keywords:
Steganography, exploitation, Malicious Code
Online: 3 January 2019 (14:35:03 CET)
ARTICLE
|
doi:10.20944/preprints202309.1531.v1
Subject:
Computer Science And Mathematics,
Security Systems
Keywords:
malicious document; VBA; macro; obfuscation; suspicious keywords; machine learning
Online: 22 September 2023 (09:12:01 CEST)
ARTICLE
|
doi:10.20944/preprints202401.1142.v1
Subject:
Computer Science And Mathematics,
Security Systems
Keywords:
Phishing Detection; Stack Generalization; LSTM Networks; Anti‐Phishing; Malicious URLs
Online: 15 January 2024 (16:46:59 CET)
REVIEW
|
doi:10.20944/preprints202206.0241.v1
Subject:
Computer Science And Mathematics,
Artificial Intelligence And Machine Learning
Keywords:
Android security; machine learning; malware analysis; malicious application detection; survey
Online: 16 June 2022 (11:01:47 CEST)
ARTICLE
|
doi:10.20944/preprints202407.0813.v1
Subject:
Computer Science And Mathematics,
Computer Networks And Communications
Keywords:
Internet of Vehicles; malicious behavior; trust management; trust-based IoV simulator; trust parameters
Online: 10 July 2024 (05:08:37 CEST)
ARTICLE
|
doi:10.20944/preprints202212.0054.v1
Subject:
Computer Science And Mathematics,
Security Systems
Keywords:
Security analysis; Blockchain; probabilistic analysis; sharding-based Blockchain protocols; malicious nodes; Proof-of-Stake; practical Byzantine fault tolerance.
Online: 5 December 2022 (01:00:40 CET)
ARTICLE
|
doi:10.20944/preprints202102.0404.v1
Subject:
Computer Science And Mathematics,
Algebra And Number Theory
Keywords:
Darknet; Traffic Analysis; Network Management; Malicious Intent Detection; Weight Agnostic Neural Networks; Real-Time Forensics; Shapley Value; Power Predicting Score
Online: 18 February 2021 (09:56:34 CET)
ARTICLE
|
doi:10.20944/preprints202306.1041.v2
Subject:
Computer Science And Mathematics,
Information Systems
Keywords:
Microsoft 365; digital forensics analysis; adversarial behavior patterns; cybersecurity; malicious login attempts; data breaches; compromised email addresses; pattern recognition; cloud-based environments
Online: 3 July 2023 (13:13:37 CEST)
ARTICLE
|
doi:10.20944/preprints202305.0428.v1
Subject:
Computer Science And Mathematics,
Security Systems
Keywords:
Attacks-in-IoHT; Attack analysis; Malicious activities in IoHT; DoDAG attack; Blackhole attack; Rank attack; 6LoWPAN-IoT; Patient-centric IoHT; Resource-constrained IoHT; IoHT performance evaluation; RPL-based IoHT
Online: 8 May 2023 (03:17:36 CEST)