Results 71 to 80 of about 16,685 (199)
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley +1 more source
Due to the widespread usage of Android smartphones in the present era, Android malware has become a grave security concern. The research community relies on publicly available datasets to keep pace with evolving malware.
Husnain Rafiq +4 more
doaj +1 more source
Leveraging Ethical Narratives to Enhance LLM‐AutoML Generated Machine Learning Models
ABSTRACT The growing popularity of generative AI and large language models (LLMs) has sparked innovation alongside debate, particularly around issues of plagiarism and intellectual property law. However, a less‐discussed concern is the quality of code generated by these models, which often contains errors and encourages poor programming practices. This
Jordan Nelson +4 more
wiley +1 more source
A Survey and Evaluation of Android-Based Malware Evasion Techniques and Detection Frameworks
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware.
Parvez Faruki +5 more
doaj +1 more source
Recently, some clinicians have been diagnosing and treating arrhythmias on the basis of electrocardiogram (ECG) devices with low accuracy. In Europe and the US, several statements on the use of ECGs have already been published by related academic societies.
Takanori Ikeda +22 more
wiley +1 more source
A-Pot: A Comprehensive Android Analysis Platform Based on Container Technology
Recently, intelligent Android malware avoids being analyzed using anti-emulator, anti-debugging, and rooting detection. Existing emulators have problems to be easily detected by malware that check with hardware or sensor information.
Jungsoo Park +4 more
doaj +1 more source
TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon +3 more
wiley +1 more source
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu +10 more
wiley +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source

