In the Internet age, malware (such as viruses, trojans, ransomware, and bots) has posed serious andevolving security threats to Internet users. To protect legitimate users from these threats, anti-malware softwareproducts from different companies, including Comodo, Kaspersky, Kingsoft, and Symantec, provide the majordefense against malware. Unfortunately, driven by the economic benefits, the number of new malware sampleshas explosively increased: anti-malware vendors are now confronted with millions of potential malware samplesper year. In order to keep on combating the increase in malware samples, there is an urgent need to developintelligent methods for effective and efficient malware detection from the real and large daily sample collection.One of the most common approaches in literature is using machine learning techniques, to automatically learnmodels and patterns behind such complexity, and to develop technologies to keep pace with malware evolution.This survey aims at providing an overview on the way machine learning has been used so far in the context ofmalware analysis in Windows environments. This paper gives an survey on the features related to malware filesor documents and what machine learning techniques they employ (i.e., what algorithm is used to process the inputand produce the output). Different issues and challenges are also discussed.
Cloud computing is an enormous area which shares huge amount of data over cloud services and it has been increasing with its on-demand technology. Since, with these versatile cloud services, when the delicate data stored within the cloud storage servers, there are some difficulties which has to be managed like its Security Issues, Data Privacy, Data Confidentiality, Data Sharing and its integrity over the cloud servers dynamically. Also, the authenticity and data access control should be maintained in this wide environment. Thus, Attribute based Encryption (ABE) is a significant version of cryptographic technique in the cloud computing environment. Public Key Encryption acts as the basic technique for ABE where it provides one to many encryptions, here, the private key of users & the cipher-text both rely on attributes such that, when the set of the attributes of users key matches set of attributes of cipher-text with its corresponding access policy, only then decryption is possible. Thus, an opponent could grant access to the sensitive information that holds multiple keys, if it has at least one individual key for accession. The techniques based on ABE consist of two types: KP-ABE (Key- Policy ABE) where the user’s private key is linked to an access structure (or access policy) over attributes and cipher-text is connected to the set of attributes, and CP-ABE (cipher-text policy ABE) is vice versa. Hence, in this, Review we discuss about the various security techniques and relations based on Attributes Based Encryption, especially, the type KP-ABE over data attributes which explains secured methods & its schemes related to time specifications.
Image segmentation is an essential but critical component in low level vision image analysis, pattern recognition, and in robotic systems. It is one of the most difficult and challenging tasks in image processing which determines the quality of the final result of the image analysis. Image segmentation is the process of dividing an image into different regions such that each region is homogeneous. A precise segmentation of medical image is an important stage in contouring throughout radiotherapy preparation. Medical images are mostly used as radiographic techniques in diagnosis, clinical studies and treatment planning. This review paper defines the limitation and strength of each methods currently existing for the segmentation of medical images.
Photovoltaic power generation refers to the use of solar photovoltaic cells to the solar radiation can be directly transformed into electricity generation. Distributed photovoltaic power generation, refers to the construction in the vicinity of the user's location, the operation mode to the user side of spontaneous self-occupied mainly, the excess power on the Internet, and in the distribution system to balance the characteristics of the photovoltaic power generation facilities. Distributed photovoltaic power generation follow the principle of local conditions, clean and efficient, decentralized layout, the principle of the nearest use, and make full use of local solar energy resources, alternative and reduce fossil energy consumption. This paper aims to investigate and emphasize the importance of the grid-connected PV system. The investigation was conducted to critically review the literature on expected potential problems associated with issues of PV based grid system. The main purpose of this paper is to discuss the basic understanding of photovoltaic (PV) based distributed generation power system and how these power flows will influence the performance and stability of a power system. Some of the PV grid integration issues such as voltage regulation, voltage sags, harmonic distortion, etc are also discussed and possible solutions are also mentioned.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.