Search Results

Results (7)

Search Parameters:

Keyword: Benign
Order results
Results per page
Open AccessArticle
6 Pages, 965 KB Download PDF

Ensemble Learning of Deep URL Features based on Convolutional Neural Network for Phishing Attack Detection

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 291–296, 2021; DOI: 10.25046/aj060532
Abstract:

The deep learning-based URL classification approach using massive observations has been verified especially in the field of phishing attack detection. Various improvements have been achieved through the modeling of character and word sequence of URL based on convolutional and recurrent neural networks, and it has been proven that an ensemble approach of each model has…

Read More
(This article belongs to the SP12 (Special Issue on Multidisciplinary Sciences and Engineering 2021-22) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
18 Pages, 2,108 KB Download PDF

iDRP Framework: An Intelligent Malware Exploration Framework for Big Data and Internet of Things (IoT) Ecosystem

Advances in Science, Technology and Engineering Systems Journal, Volume 6, Issue 5, Page # 185–202, 2021; DOI: 10.25046/aj060521
Abstract:

The Internet of Things (IoT) is at a face paced growth in the advanced Industrial Revolution (IR) 4.0 in the modern digital world. Considering the current network security challenges and sophistication of attacks in the heavily computerized and interconnected systems, such as an IoT ecosystem, the need for an innovative, robust, intelligent and adaptive malware…

Read More
(This article belongs to the SP11 (Special Issue on Innovation in Computing, Engineering Science & Technology 2021) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
9 Pages, 858 KB Download PDF

An Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 6, Page # 1741–1749, 2020; DOI: 10.25046/aj0506208
Abstract:

Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…

Read More
(This article belongs to the SP10 (Special Issue on Multidisciplinary Sciences and Engineering 2020-21) & Section Information Systems in Computer Science (CIS))
Open AccessArticle
14 Pages, 781 KB Download PDF

Malware Classification Using XGboost-Gradient Boosted Decision Tree

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 5, Page # 536–549, 2020; DOI: 10.25046/aj050566
Abstract:

In this industry 4.0 and digital era, we are more dependent on the use of communication and various transaction such as financial, exchange of information by various means. These transaction needs to be secure. Differentiation between the use of benign and malware is one way to make these transactions secure. We propose in this work…

Read More
(This article belongs to Section Information Systems in Computer Science (CIS))
Open AccessArticle
12 Pages, 1,714 KB Download PDF

A Novel Hybrid Method for Segmentation and Analysis of Brain MRI for Tumor Diagnosis

Advances in Science, Technology and Engineering Systems Journal, Volume 5, Issue 3, Page # 16–27, 2020; DOI: 10.25046/aj050303
Abstract:

It is difficult to accurately segment brain MRI in the complex structures of brain tumors, blurred borders, and external variables such as noise. Much research in developing as well as developed countries show that the number of individuals suffering tumor of the brain has died as a result of the inaccurate diagnosis. The proposed article,…

Read More
(This article belongs to the SP8 (Special Issue on Multidisciplinary Sciences and Engineering 2019-20) & Section Neuroimaging (NUM))
Open AccessArticle
7 Pages, 262 KB Download PDF

Detecting Malicious Assembly using Convolutional, Recurrent Neural Networks

Advances in Science, Technology and Engineering Systems Journal, Volume 4, Issue 5, Page # 46–52, 2019; DOI: 10.25046/aj040506
Abstract:

We present findings on classifying the class of executable code using convolutional, re- current neural networks by creating images from only the .text section of executables and dividing them into standard-size windows, using minimal preprocessing. We achieve up to 98.24% testing accuracy on classifying 9 types of malware, and 99.50% testing accuracy on classifying malicious…

Read More
(This article belongs to the SP7 (Special Issue on Advancement in Engineering and Computer Science 2019) & Section Interdisciplinary Applications of Computer Science (CSI))
Open AccessArticle
9 Pages, 1,662 KB Download PDF

An Advanced Algorithm Combining SVM and ANN Classifiers to Categorize Tumor with Position from Brain MRI Images

Advances in Science, Technology and Engineering Systems Journal, Volume 3, Issue 2, Page # 40–48, 2018; DOI: 10.25046/aj030205
Abstract:

Brain tumor is such an abnormality of brain tissue that causes brain hemorrhage. Therefore, apposite detections of brain tumor, its size, and position are the foremost condition for the remedy. To obtain better performance in brain tumor and its stages detection as well as its position in MRI images, this research work proposes an advanced…

Read More
(This article belongs to the SP4 (Special issue on Advancement in Engineering Technology 2017-18) & Section Artificial Intelligence in Computer Science (CAI))

Journal Menu

Journal Browser


Special Issues

Special Issue on Digital Frontiers of Entrepreneurship: Integrating AI, Gender Equity, and Sustainable Futures
Guest Editors: Dr. Muhammad Nawaz Tunio, Dr. Aamir Rashid, Dr. Imamuddin Khoso
Deadline: 30 May 2026

Special Issue on Sustainable Technologies for a Resilient Future
Guest Editors: Dr. Debasis Mitra, Dr. Sourav Chattaraj, Dr. Addisu Assefa
Deadline: 30 April 2026