A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is
With the growing sophistication of malware, the need to devise improved malware detection schemes is crucial. ... This paper provides statistics on the use of packers based on an extensive analysis of 24,000 PE files (both malicious and benign files) for the past 10 years, which allowed us to observe trends in packing ... ACKNOWLEDGEMENTS We would like to thank Shlomi Boutnaru for his meaningful discussions regarding packing techniques and how they are being exploited by malware authors. ...doi:10.1145/3530810 fatcat:c6horhx3i5bevk5ibtu5y42rim
We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. ... Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time. ... Future work is envisioned to extend the system to detect other attacks (for example, spam messages) in VoIP networks. ...doi:10.4218/etrij.14.0113.0798 fatcat:lhwk3led3benjnid2qzbtbsmim
Intrusion Detection Systems, using various algorithms and techniques to detect malicious activities on systems or computer networks, are therefore commonly used by cyber security personnel to counteract ... Quality of the generated labeled datasets was also verified through an expert survey. ... Signature-based Detection. ...doi:10.34726/hss.2021.82646 fatcat:66k7w4f3xvdjblczx5ygl5bjve
Only a few highly diverse and accurate base models are needed to compose an effective ensemble. ... An additional, non-published work, presents a visual technique for the analysis of predictions made by individual classifiers and discusses some possible constraints for classifiers used in software defect ... Learning to rank approaches, which are regression-based, are an alternative to the classification system. In a learning to rank approach, the information about the number of defects is kept. ...doi:10.18745/th.23943 fatcat:yddpvdlzvnejvjjyy32b3rc3jm
appropriate study design based on the sizes of the considered effects. ... people's attitude and behavior in the privacy context: Although people often express concerns about their privacy, they rarely take measures to protect their private data and frequently provide private information ... (β) Number of applications (NoA) Information disclosure (general) -0.35*** Benefits -entertainment (BEN- Usage of a location sharing applica- 0.32*** E) tion Basic Information Disclosure Teen information ...doi:10.25534/tuprints-00011554 fatcat:jfdpmnzqlnaavo5bl5yajkb43i