Results 81 to 90 of about 20,533 (244)
TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon +3 more
wiley +1 more source
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu +10 more
wiley +1 more source
With the fast growth of mobile phone usage, malicious threats against Android mobile devices are enhanced. The Android system utilizes a wide range of sensitive apps like banking apps; thus, it develops the aim of malware that uses the vulnerability of ...
Shoayee Dlaim Alotaibi +7 more
doaj +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core +1 more source
Mobile SDNs: Associating End‐User Commands with Network Flows in Android Devices
In our research, we combine user interface context with network flow data to improve network profiling on Android, achieving over 98.5% accuracy. We create “AppJudicator”, an Android access control app using host‐based SDN and default Android APIs, effectively addressing security concerns in enterprise networks.
Shuwen Liu +4 more
wiley +1 more source
ANFIS-AMAL: Android Malware Threat Assessment Using Ensemble of ANFIS and GWO
The Android malware has various features and capabilities. Various malware has distinctive characteristics. Ransomware threatens financial loss and system lockdown.
Nwasra Nedal +2 more
doaj +1 more source
XAI and Android Malware Models
Android malware detection based on machine learning (ML) and deep learning (DL) models is widely used for mobile device security. Such models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such learning models make decisions. As a result, these popular malware detection strategies are generally
Maithili Kulkarni, Mark Stamp
openaire +2 more sources
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley +1 more source
AMALGAN: Image‐Based Android Malware Classification Using Generative Adversarial Network
The Android malware detection process requires analysing numerous files to ensure system security. Malware can also be embedded in media files and images.
Zahid Hussain Qaisar +2 more
doaj +1 more source

