Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cybersecurity (3)
- ToC (3)
- Blockchain (2)
- Control (2)
- Editorial (2)
-
- Indonesia (2)
- Intellectual capital (2)
- Malaysia (2)
- Project management (2)
- SME (2)
- SMEs (2)
- AI (1)
- Academic integrity (1)
- Access control (1)
- Accountancy (1)
- Accountancy information system (1)
- Adoption (1)
- Adoption factor (1)
- Adoption model. (1)
- Affordance (1)
- Age (1)
- Agility (1)
- American cultural style (1)
- And VFT (1)
- And remote monitoring (1)
- Anti-corruption strategies (1)
- Appalachia (1)
- Artificial Intelligence (1)
- Attitude (1)
- Authentication (1)
- Publication
-
- Journal of International Technology and Information Management (15)
- The South East Asian Journal of Management (13)
- The African Journal of Information Systems (11)
- Journal of Cybersecurity Education, Research and Practice (7)
- Communications of the IIMA (6)
-
- Southwestern Business Administration Journal (3)
- Al Jinan الجنان (2)
- Mountain Plains Journal of Business and Technology (2)
- Engaged Management ReView (1)
- Future Computing and Informatics Journal (1)
- International Journal for Business Education (1)
- Journal of Appalachian Health (1)
- Markets, Globalization & Development Review (1)
- Marriott Student Review (1)
Articles 61 - 65 of 65
Full-Text Articles in Business
Table Of Contents Jitim Vol 29 Issue 2, 2020
Table Of Contents Jitim Vol 29 Issue 2, 2020
Journal of International Technology and Information Management
Table of contents
Table Of Contents Jitim Vol 29 Issue 3, 2020
Table Of Contents Jitim Vol 29 Issue 3, 2020
Journal of International Technology and Information Management
Table of contents
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Editorial, Michael E. Whitman, Herbert J. Mattord, Hossain Shahriar
Journal of Cybersecurity Education, Research and Practice
No abstract provided.
Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari
Gdom: Granulometry For The Detection Of Obfuscated Malware, John A. Aruta, N. Paul Schembari
Journal of Cybersecurity Education, Research and Practice
We describe the results of a master's thesis in malware detection and discuss the connection to the learning goals of the project. As part of the thesis, we studied obfuscation of malware, conversion of files into images, image processing, and machine learning, a process of benefit to both the student and faculty.
Malware detection becomes significantly more difficult when the malicious specimen is obfuscated or transformed in an attempt to avoid detection. However, computer files have been shown to exhibit evidence of structure when converted into images, so with image processing filters such as granulometry, it is possible to generate …