Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remain...
详细信息
Malware attacks on Windows machines pose significant cybersecurity threats,necessitating effective detection and prevention *** machine learning classifiers have emerged as promising tools for malware ***,there remains a need for comprehensive studies that compare the performance of different classifiers specifically for Windows malware *** this gap can provide valuable insights for enhancing cybersecurity *** numerous studies have explored malware detection using machine learning techniques,there is a lack of systematic comparison of supervised classifiers for Windows malware *** the relative effectiveness of these classifiers can inform the selection of optimal detection methods and improve overall security *** study aims to bridge the research gap by conducting a comparative analysis of supervised machine learning classifiers for detecting malware on Windows *** objectives include Investigating the performance of various classifiers,such as Gaussian Naïve Bayes,K Nearest Neighbors(KNN),Stochastic Gradient Descent Classifier(SGDC),and Decision Tree,in detecting Windows *** the accuracy,efficiency,and suitability of each classifier for real-world malware detection *** the strengths and limitations of different classifiers to provide insights for cybersecurity practitioners and *** recommendations for selecting the most effective classifier for Windows malware detection based on empirical *** study employs a structured methodology consisting of several phases:exploratory data analysis,data preprocessing,model training,and *** data analysis involves understanding the dataset’s characteristics and identifying preprocessing *** preprocessing includes cleaning,feature encoding,dimensionality reduction,and optimization to prepare the data for *** training utilizes various
The study examines how artificial intelligence (AI) affects informationsystems (IS) decision-making, emphasizing how AI improves precision, speed, and flexibility in a range of industries. AI presents potential and p...
详细信息
Kazakhstan's deputy member is vast, and is one of sparse population, scattering and creating an overwhelming challenge to map and assess the water resources. Most of the waters are in remote and poorly equipped ar...
详细信息
Challenged networks (CNs) contain resource-constrained nodes deployed in regions where human intervention is difficult. Opportunistic networks (OppNets) are CNs with no predefined source-to-destination paths. Due to t...
详细信息
Skin cancer poses a significant health hazard, necessitating the utilization of advanced diagnostic methodologies to facilitate timely detection, owing to its escalating prevalence in recent years. This paper proposes...
详细信息
we introduced image encryption algorithms with high sensitivity, such that even a single alteration in a plain-text image would result in a complete transformation of the ciphered image. The first algorithm employed p...
详细信息
Decentralized Anonymous Payment systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
The contemporary context of abundant digital dissemination inherently gives rise to the need for media protection and the clear identification of ownership rights. This paper responded to this nagging issue of unautho...
详细信息
作者:
Brodniansky, JurajLang, JánInstitute of Informatics
Information Systems and Software Engineering Faculty of Informatics and Information Technologies Slovak Technical University in Bratislava Bratislava Slovakia
Attention management in software development proves to be a highly relevant issue. It offers various ways of managing the user’s attention using visual perception of the work environment. Awareness of the workplace p...
详细信息
With the ever-rising risk of phishing attacks, which capitalize on vulnerable human behavior in the contemporary digital space, requires new cybersecurity methods. This literary work contributes to the solution by nov...
详细信息
暂无评论