Results 191 to 200 of about 20,046 (244)
Mobile malware detection method using improved GhostNetV2 with image enhancement technique. [PDF]
Du Y +5 more
europepmc +1 more source
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms. [PDF]
Alohali MA +7 more
europepmc +1 more source
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence. [PDF]
Mawoh RY +4 more
europepmc +1 more source
MALITE: Lightweight Malware Detection and Classification for Constrained Devices. [PDF]
Anand S +5 more
europepmc +1 more source
Multimodal malware classification using proposed ensemble deep neural network framework. [PDF]
Nazim S +5 more
europepmc +1 more source
Data trace as the scientific foundation for trusted metrological data: a review for future metrology direction. [PDF]
Cao Z +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Proceedings of the 12th International Conference on Availability, Reliability and Security, 2017
The number of Android malware is increasing every day. Thus Android malware detection is nowadays a big challenge. One of the most tedious tasks in malware detection is the extraction of malicious behaviors. This task is usually done manually and requires a huge effort of engineering. To avoid this step, we propose in this paper to use machine learning
Khanh-Huu-The Dam, Tayssir Touili
openaire +1 more source
The number of Android malware is increasing every day. Thus Android malware detection is nowadays a big challenge. One of the most tedious tasks in malware detection is the extraction of malicious behaviors. This task is usually done manually and requires a huge effort of engineering. To avoid this step, we propose in this paper to use machine learning
Khanh-Huu-The Dam, Tayssir Touili
openaire +1 more source
2019 26th Asia-Pacific Software Engineering Conference (APSEC), 2019
Android OS being the popular choice of majority users also faces the constant risk of breach of confidentiality, integrity and availability (CIA). Effective mitigation efforts needs to identified in order to protect and uphold the CIA triad model, within the android ecosystem.
Anand Tirkey +2 more
openaire +1 more source
Android OS being the popular choice of majority users also faces the constant risk of breach of confidentiality, integrity and availability (CIA). Effective mitigation efforts needs to identified in order to protect and uphold the CIA triad model, within the android ecosystem.
Anand Tirkey +2 more
openaire +1 more source

