Results 21 to 30 of about 590 (134)

TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments

open access: yesExpert Systems, Volume 42, Issue 2, February 2025.
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon   +3 more
wiley   +1 more source

Smart Homes of the Future

open access: yesTransactions on Emerging Telecommunications Technologies, Volume 36, Issue 1, January 2025.
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu   +10 more
wiley   +1 more source

Android malware detection: An eigenspace analysis approach [PDF]

open access: yes2015 Science and Information Conference (SAI), 2015
7 pages, 4 figures ...
Yerima, Suleiman Y.   +2 more
openaire   +3 more sources

Advanced hybrid malware identification framework for the Internet of Medical Things, driven by deep learning

open access: yesSECURITY AND PRIVACY, Volume 8, Issue 1, January/February 2025.
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer   +5 more
wiley   +1 more source

Malware Detection Techniques in Android

open access: yesInternational Journal of Computer Applications, 2015
Phones have become an important need of today. The term mobile phone and smart phone are almost identical now - a-days. Smartphone market is booming with very high speed. Smartphones have gained such a huge popularity due to wide range of capabilities they offer. Currently android platform is leading the smartphone market.
Amit Jain, Pallavi Kaushik
openaire   +1 more source

Mobile SDNs: Associating End‐User Commands with Network Flows in Android Devices

open access: yesIET Communications, Volume 19, Issue 1, January/December 2025.
In our research, we combine user interface context with network flow data to improve network profiling on Android, achieving over 98.5% accuracy. We create “AppJudicator”, an Android access control app using host‐based SDN and default Android APIs, effectively addressing security concerns in enterprise networks.
Shuwen Liu   +4 more
wiley   +1 more source

Towards autonomous device protection using behavioural profiling and generative artificial intelligence

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley   +1 more source

A Systematic Review of Sensor Vulnerabilities and Cyber‐Physical Threats in Industrial Robotic Systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 10, Issue 1, January/December 2025.
This paper addresses a critical gap in the literature of industrial robotics cybersecurity by presenting a comprehensive analysis of vulnerabilities in the sensing systems of industrial robots. In particular, we systematically explore how sensor performance limits, faults and biases can be exploited by attackers who can then turn these inherent ...
Abdul Kareem Shaik   +2 more
wiley   +1 more source

AEDroid: Adaptive Enhanced Android Malware Detection‐Based on Interpretability of Deep Learning

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged.
Pengfei Liu   +5 more
wiley   +1 more source

Backdoor Attack and Defense Methods for AI–Based IoT Intrusion Detection System

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
The Internet of Things (IoT) is an emerging technology that has attracted significant attention and triggered a technical revolution in recent years. Numerous IoT devices are directly connected to the physical world, such as security cameras and medical equipment, making IoT security a critical issue.
Bowen Ma   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy