A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks

2021 ◽  
Vol 92 ◽  
pp. 107143
Author(s):  
S. Abijah Roseline ◽  
S. Geetha
2020 ◽  
Author(s):  
Carolyn Semmler

This report details the performance of professional and expert facial comparison practitioners working in the Australian policing and national security context. As part of a joint University of Adelaide - Defence Science and Technology Group project, known as the Human Operator Capability Project, a comprehensive survey of 149 facial comparison practitioners within Australian State and Federal Government agencies was conducted in late 2010. The survey collected data in a range of categories including: demographics, training and work history, facial comparison tools and techniques, attitudes to the facial comparison task and use of facial recognition systems. This report outlines the key findings from the survey, including implications for the consideration of participating agencies at the time. An epilogue reflects on what has changed in the time since the survey was conducted.


2018 ◽  
Vol 51 (2) ◽  
pp. 1-35 ◽  
Author(s):  
Elisa Rojas ◽  
Roberto Doriguzzi-Corin ◽  
Sergio Tamurejo ◽  
Andres Beato ◽  
Arne Schwabe ◽  
...  

Information ◽  
2021 ◽  
Vol 12 (5) ◽  
pp. 185
Author(s):  
Vasileios Kouliaridis ◽  
Georgios Kambourakis

Year after year, mobile malware attacks grow in both sophistication and diffusion. As the open source Android platform continues to dominate the market, malware writers consider it as their preferred target. Almost strictly, state-of-the-art mobile malware detection solutions in the literature capitalize on machine learning to detect pieces of malware. Nevertheless, our findings clearly indicate that the majority of existing works utilize different metrics and models and employ diverse datasets and classification features stemming from disparate analysis techniques, i.e., static, dynamic, or hybrid. This complicates the cross-comparison of the various proposed detection schemes and may also raise doubts about the derived results. To address this problem, spanning a period of the last seven years, this work attempts to schematize the so far ML-powered malware detection approaches and techniques by organizing them under four axes, namely, the age of the selected dataset, the analysis type used, the employed ML techniques, and the chosen performance metrics. Moreover, based on these axes, we introduce a converging scheme which can guide future Android malware detection techniques and provide a solid baseline to machine learning practices in this field.


Author(s):  
Asim Shahzad ◽  
Deden Witarsyah Jacob ◽  
Nazri Mohd Nawi ◽  
Hairulnizam Mahdin ◽  
Marheni Eka Saputri

<span>Search Engines are used to search any information on the internet. <br /> The primary objective of any website owner is to list their website at the top of all the results in Search Engine Results Pages (SERPs). Search Engine Optimization is the art of increasing visibility of a website in Search Engine Result Pages. This art of improving the visibility of website requires the tools and techniques; This paper is a comprehensive survey of how a Search Engine (SE) works, types and parts of Search Engine and different techniques and tools used for Search Engine Optimization (SEO.) In this paper, we will discuss the current tools and techniques in practice for Search Engine Optimization.</span>


Author(s):  
Manbir Sandhu ◽  
Purnima, Anuradha Saini

Big data is a fast-growing technology that has the scope to mine huge amount of data to be used in various analytic applications. With large amount of data streaming in from a myriad of sources: social media, online transactions and ubiquity of smart devices, Big Data is practically garnering attention across all stakeholders from academics, banking, government, heath care, manufacturing and retail. Big Data refers to an enormous amount of data generated from disparate sources along with data analytic techniques to examine this voluminous data for predictive trends and patterns, to exploit new growth opportunities, to gain insight, to make informed decisions and optimize processes. Data-driven decision making is the essence of business establishments. The explosive growth of data is steering the business units to tap the potential of Big Data to achieve fueling growth and to achieve a cutting edge over their competitors. The overwhelming generation of data brings with it, its share of concerns. This paper discusses the concept of Big Data, its characteristics, the tools and techniques deployed by organizations to harness the power of Big Data and the daunting issues that hinder the adoption of Business Intelligence in Big Data strategies in organizations.


Sign in / Sign up

Export Citation Format

Share Document