Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29 Cyber ThreatSoftware SecurityVulnerability Management 2022.06.29 2025.05.28 Literature Database
GANG-MAM: GAN based enGine for Modifying Android Malware Authors: Renjith G, Sonia Laudanna, Aji S, Corrado Aaron Visaggio, Vinod P | Published: 2021-09-27 Software SecurityMalware Detection MethodAdversarial attack 2021.09.27 2025.05.28 Literature Database
POSSE: Patterns of Systems During Software Encryption Authors: David Noever, Samantha Miller Noever | Published: 2021-09-24 Software SecurityPerformance EvaluationMachine Learning Application 2021.09.24 2025.05.28 Literature Database
Comment on “AndrODet: An adaptive Android obfuscation detector” Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18 Software SecurityExperimental ValidationMachine Learning Algorithm 2019.10.14 2025.05.28 Literature Database