Results 81 to 90 of about 20,533 (244)

TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon   +3 more
wiley   +1 more source

Smart Homes of the Future

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 1, January 2025.
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu   +10 more
wiley   +1 more source

Bioinspired artificial intelligence based android malware detection and classification for cybersecurity applications

open access: yesAlexandria Engineering Journal
With the fast growth of mobile phone usage, malicious threats against Android mobile devices are enhanced. The Android system utilizes a wide range of sensitive apps like banking apps; thus, it develops the aim of malware that uses the vulnerability of ...
Shoayee Dlaim Alotaibi   +7 more
doaj   +1 more source

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]

open access: yes, 2014
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core   +1 more source

Mobile SDNs: Associating End‐User Commands with Network Flows in Android Devices

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In our research, we combine user interface context with network flow data to improve network profiling on Android, achieving over 98.5% accuracy. We create “AppJudicator”, an Android access control app using host‐based SDN and default Android APIs, effectively addressing security concerns in enterprise networks.
Shuwen Liu   +4 more
wiley   +1 more source

ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO

open access: yesCybernetics and Information Technologies
The Android malware has various features and capabilities. Various malware has distinctive characteristics. Ransomware threatens financial loss and system lockdown.
Nwasra Nedal   +2 more
doaj   +1 more source

XAI and Android Malware Models

open access: yes
Android malware detection based on machine learning (ML) and deep learning (DL) models is widely used for mobile device security. Such models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such learning models make decisions. As a result, these popular malware detection strategies are generally
Maithili Kulkarni, Mark Stamp
openaire   +2 more sources

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

AMALGAN: Image‐Based Android Malware Classification Using Generative Adversarial Network

open access: yesThe Journal of Engineering
The Android malware detection process requires analysing numerous files to ensure system security. Malware can also be embedded in media files and images.
Zahid Hussain Qaisar   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy