The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, there are significant amounts of malware codes that are created every day. However, the majority of these samples (malware) are variations of other malware that have been already identified. Therefore, most of the analyzed malware have similar structure among them. In this investigation, we will present a technic to extract features throughout different abstraction levels in order to classify...
Malware are the big threat within the digital world as they have a highly complex technological structure that is capable of penetrating networks, obtaining confidential information from personal computers and corporate systems, and even of making systems of critical infrastructure vulnerable. However, in order to achieve their objectives, they need to remain updated, so that they will not be detected...
The threat that attacks cyberspace is known as malware. In order to infect the technologic devices that are attacked, malware needs to evade the different antivirus systems. To avoid detection, an obfuscation technique must be applied so malware is updated and ready to be performed. No obstant, the technique implementation presents difficulties in terms of its required ability, evasion tests and infection...
The world of mobile devices which have the quality to stay connected to the web is going through a exponential growth, but in parallel with this event, appears the threats with the developing of an equal magnitude, which are segmented primarily by the characteristics of the target device, therefore, as an final user is very difficult to know how exposed it is to use or purchase one of these devices...
The vertiginous change in technologies and the increasing sophistication that cyber space present require organization and permanent preparation. However, time, education and training, results too short and not appropriate enough through traditional training methods. Training through simulation may offer proper preparation to fight against new threats that exist in this digital battlefield. The paper...
With the fast growth of the Latin America ecommerce industry, it is thus indispensable to design effective applications for e-commerce websites in a Latin American context, by taking into account cultural factors. In this paper, we conduct an empirical study of different platforms from an exponential business sector. This paper presents initial evidence in support of our argument that interfaces that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.