Results 61 to 70 of about 16,685 (199)

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

Static analysis framework for permission-based dataset generation and android malware detection using machine learning

open access: yesEURASIP Journal on Information Security
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak   +2 more
doaj   +1 more source

Evaluation of Advanced Ensemble Learning Techniques for Android Malware Detection [PDF]

open access: yesVietnam Journal of Computer Science, 2020
Android is the most well-known portable working framework having billions of dynamic clients worldwide that pulled in promoters, programmers, and cybercriminals to create malware for different purposes. As of late, wide-running inquiries have been led on
Md. Shohel Rana, Andrew H. Sung
doaj   +1 more source

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

TTGNet-AMD: Android malware detection based on multi-modal feature fusion [PDF]

open access: yesPeerJ Computer Science
The application of static features for Android malware detection has been extensively studied and developed. Existing methods exhibit limitations in both the completeness and discriminability of feature representation, which affects the enhancement of ...
Jiayin Feng   +5 more
doaj   +2 more sources

Improved chimp optimization algorithm (ICOA) feature selection and deep neural network framework for internet of things (IOT) based android malware detection

open access: yesMeasurement: Sensors, 2023
Internet of Things (IoT) is extensively implemented using Android applications thus detecting malicious Android apps is necessary. Malicious has been multiplying fast as a result of the growing usage of smartphones.
Tirumala Vasu G   +5 more
doaj   +1 more source

Android Malware Detection Using Deep Learning

open access: yes, 2022
This chapter investigates the potential of deep learning architectures for Android malware detection, specifically convolutional neural networks (CNNs) using natural language processing (NLP) concepts. The proposed solution is based on static analysis of raw opcode sequences from disassembled programs and other complementary features such as API calls ...
Millar, Stuart   +3 more
openaire   +3 more sources

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]

open access: yes, 2019
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core   +1 more source

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

Home - About - Disclaimer - Privacy