Pub Date : 2022-08-16DOI: 10.1007/s11416-022-00445-y
H. Hashemi, M. Samie, A. Hamzeh
{"title":"IFMD: image fusion for malware detection","authors":"H. Hashemi, M. Samie, A. Hamzeh","doi":"10.1007/s11416-022-00445-y","DOIUrl":"https://doi.org/10.1007/s11416-022-00445-y","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"271 - 286"},"PeriodicalIF":0.0,"publicationDate":"2022-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45767122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM","authors":"Mundlamuri Venkata Rao, Divya Midhunchakkaravarthy, Sujatha Dandu","doi":"10.1007/s11416-022-00442-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00442-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"241 - 255"},"PeriodicalIF":0.0,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49649013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-31DOI: 10.1007/s11416-022-00441-2
S. Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan
{"title":"XAI for intrusion detection system: comparing explanations based on global and local scope","authors":"S. Hariharan, R. R. Rejimol Robinson, Rendhir R. Prasad, Ciza Thomas, N. Balakrishnan","doi":"10.1007/s11416-022-00441-2","DOIUrl":"https://doi.org/10.1007/s11416-022-00441-2","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"217 - 239"},"PeriodicalIF":0.0,"publicationDate":"2022-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49063618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-14DOI: 10.1007/s11416-022-00431-4
S. Azizpour, M. Majma
{"title":"NADA: new architecture for detecting DoS and DDoS attacks in fog computing","authors":"S. Azizpour, M. Majma","doi":"10.1007/s11416-022-00431-4","DOIUrl":"https://doi.org/10.1007/s11416-022-00431-4","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"51 - 64"},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43843328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-22DOI: 10.1007/s11416-022-00434-1
Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo
{"title":"Application of the SAMA methodology to Ryuk malware","authors":"Ander Granado Masid, Javier Bermejo Higuera, Juan Ramón Bermejo Higuera, Juan Antonio Sicilia Montalvo","doi":"10.1007/s11416-022-00434-1","DOIUrl":"https://doi.org/10.1007/s11416-022-00434-1","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"19 1","pages":"165 - 198"},"PeriodicalIF":0.0,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44159912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-15DOI: 10.1007/s11416-022-00423-4
Stavros D. Nikolopoulos, Iosif Polenakis
{"title":"Behavior-based detection and classification of malicious software utilizing structural characteristics of group sequence graphs","authors":"Stavros D. Nikolopoulos, Iosif Polenakis","doi":"10.1007/s11416-022-00423-4","DOIUrl":"https://doi.org/10.1007/s11416-022-00423-4","url":null,"abstract":"","PeriodicalId":34117,"journal":{"name":"Angles","volume":"18 1","pages":"383 - 406"},"PeriodicalIF":0.0,"publicationDate":"2022-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49571459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}