Results 11 to 20 of about 222,584 (313)

Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices

open access: yesItalian National Conference on Sensors, 2022
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
semanticscholar   +1 more source

Malware Analysis in IoT & Android Systems with Defensive Mechanism

open access: yesElectronics, 2022
The Internet of Things (IoT) and the Android operating system have made cutting-edge technology accessible to the general public. These are affordable, easy-to-use, and open-source technology.
Chandra Shekhar Yadav   +8 more
semanticscholar   +1 more source

Detection and Prevention of Malware in Android Operating System

open access: yesMehran University Research Journal of Engineering and Technology, 2021
The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share,
Kashif Ali Dahri   +2 more
doaj   +1 more source

An Automated Vision-Based Deep Learning Model for Efficient Detection of Android Malware Attacks

open access: yesIEEE Access, 2022
Recently, cybersecurity experts and researchers have given special attention to developing cost-effective deep learning (DL)-based algorithms for Android malware detection (AMD) systems.
Iman M. Almomani   +2 more
semanticscholar   +1 more source

Malware Detection: A Framework for Reverse Engineered Android Applications through Machine Learning Algorithms

open access: yesIEEE Access, 2022
Today, Android is one of the most used operating systems in smartphone technology. This is the main reason, Android has become the favorite target for hackers and attackers.
Beenish Urooj   +4 more
semanticscholar   +1 more source

Research of kinematics of an actuating group of an anthropomorphic gripper with a common drive

open access: yesMATEC Web of Conferences, 2018
Anthropomorphic robots (AR): Robonaut (USA), Asimo (Japan), FEDOR (Russia) are similar to human capabilities in performable actions. Whereby the AR efficiency depends on the anthropomorphic gripper (AG) functionality.
Bogdanov Alexey   +2 more
doaj   +1 more source

MUXER—A New Equipment for Energy Saving in Ethernet

open access: yesTechnologies, 2017
Nowadays, the rapidly increasing energy consumption of communication equipment is an economic and environmental problem that needs to be addressed. Small Local Area Networks (LAN) switches in the US alone consume about 8 TWh per year that corresponds to ...
Md Mehedi Hassan Onik   +3 more
doaj   +1 more source

PAIRED: An Explainable Lightweight Android Malware Detection System

open access: yesIEEE Access, 2022
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
M. Alani, A. Awad
semanticscholar   +1 more source

PENGARUH JENIS PRODUK TERHADAP VOLUME PENJUALAN HAND PHONE ANDROID DI COUNTER CLINIK ANDROID MADIUN

open access: yesEQUILIBRIUM: Jurnal Ilmiah Ekonomi dan Pembelajarannya, 2015
Penelitian ini bertujuan (1) Untuk mengetahui bagaimana jenis produk android di Counter Clinik Android Madiun. (2) Untuk mengetahui bagaimana volume penjualan android di Counter Clinik Android Madiun.
Khoirul Ikhwan
doaj   +1 more source

The rise of obfuscated Android malware and impacts on detection methods

open access: yesPeerJ Computer Science, 2022
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy