You are currently viewing a new version of our website. To view the old version click .

Information, Volume 12, Issue 5

May 2021 - 40 articles

Cover Story: As the Android platform continues to dominate the market, malware writers consider it as their preferred target. State-of-the-art malware detection solutions capitalize on ML to detect pieces of malware. Nevertheless, our findings clearly indicate that the majority of existing works utilize different metrics and models and employ diverse datasets and classification features. This complicates the cross-comparison and may also raise doubts about the derived results. This work attempts to schematize the so far ML-powered malware detection approaches by organizing them under four axes, namely, the age of the dataset, the analysis type, the employed ML techniques, and the chosen performance metrics. Moreover, we introduce a converging scheme that can guide future detection techniques and provide a solid baseline to ML practices in this field. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list .
  • You may sign up for email alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.

Articles (40)

  • Article
  • Open Access
7 Citations
5,817 Views
11 Pages

Autonomous weapons systems (AWS), sometimes referred to as “killer robots”, are receiving ever more attention, both in public discourse as well as by scholars and policymakers. Much of this interest is connected to emerging ethical and legal problems...

  • Article
  • Open Access
74 Citations
14,671 Views
17 Pages

Network Traffic Anomaly Detection via Deep Learning

  • Konstantina Fotiadou,
  • Terpsichori-Helen Velivassaki,
  • Artemis Voulkidis,
  • Dimitrios Skias,
  • Sofia Tsekeridou and
  • Theodore Zahariadis

Network intrusion detection is a key pillar towards the sustainability and normal operation of information systems. Complex threat patterns and malicious actors are able to cause severe damages to cyber-systems. In this work, we propose novel Deep Le...

  • Article
  • Open Access
6 Citations
3,562 Views
16 Pages

Missing Link Prediction Using Non-Overlapped Features and Multiple Sources of Social Networks

  • Pokpong Songmuang,
  • Chainarong Sirisup and
  • Aroonwan Suebsriwichai

The current methods for missing link prediction in social networks focus on using data from overlapping users from two social network sources to recommend links between unconnected users. To improve prediction of the missing link, this paper presents...

  • Article
  • Open Access
3 Citations
4,142 Views
12 Pages

In order to ensure the driver’s safe driving, the human–computer interaction interface of an intelligent vehicle needs to convey important information. The text is an important carrier of this kind of information. The design criteria of English chara...

  • Article
  • Open Access
2,356 Views
20 Pages

Sub-Tree-Based Approach for Reconfiguration of Light-Tree Pair without Flow Interruption in Sparse Wavelength Converter Network

  • Amanvon Ferdinand Atta,
  • Joël Christian Adépo,
  • Bernard Cousin and
  • Souleymane Oumtanaga

Network reconfiguration is an important mechanism for network operators to optimize network performance and optical flow transfer. It concerns unicast and multicast connections. Multicast connections are required to meet the bandwidth requirements of...

  • Review
  • Open Access
3 Citations
2,954 Views
12 Pages

A Survey on Old and New Approximations to the Function ϕ(x) Involved in LDPC Codes Density Evolution Analysis Using a Gaussian Approximation

  • Francesca Vatta,
  • Alessandro Soranzo,
  • Massimiliano Comisso,
  • Giulia Buttazzoni and
  • Fulvio Babich

Low Density Parity Check (LDPC) codes are currently being deeply analyzed through algorithms that require the capability of addressing their iterative decoding convergence performance. Since it has been observed that the probability distribution func...

  • Article
  • Open Access
3 Citations
3,248 Views
21 Pages

Makerspaces have gained momentum, not only due to novel manufacturing technologies but also the need for qualified workforce in production industries. Capacity building should not follow ad hoc procedures or arbitrary project designs to qualify for d...

  • Article
  • Open Access
24 Citations
4,443 Views
12 Pages

A Hybrid Model for Air Quality Prediction Based on Data Decomposition

  • Shurui Fan,
  • Dongxia Hao,
  • Yu Feng,
  • Kewen Xia and
  • Wenbiao Yang

Accurate and reliable air quality predictions are critical to the ecological environment and public health. For the traditional model fails to make full use of the high and low frequency information obtained after wavelet decomposition, which easily...

  • Article
  • Open Access
12 Citations
7,366 Views
13 Pages

Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia

  • Majid H. Alsulami,
  • Fawaz D. Alharbi,
  • Hamdan M. Almutairi,
  • Bandar S. Almutairi,
  • Mohammed M. Alotaibi,
  • Majdi E. Alanzi,
  • Khaled G. Alotaibi and
  • Sultan S. Alharthi

Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organiz...

  • Article
  • Open Access
17 Citations
8,263 Views
16 Pages

Multilingual characteristics, lack of annotated data, and imbalanced sample distribution are the three main challenges for toxic comment analysis in a multilingual setting. This paper proposes a multilingual toxic text classifier which adopts a novel...

of 4

Get Alerted

Add your email address to receive forthcoming issues of this journal.

XFacebookLinkedIn
Information - ISSN 2078-2489