Results 21 to 30 of about 590 (134)
TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon +3 more
wiley +1 more source
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu +10 more
wiley +1 more source
Android malware detection: An eigenspace analysis approach [PDF]
7 pages, 4 figures ...
Yerima, Suleiman Y. +2 more
openaire +3 more sources
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
Malware Detection Techniques in Android
Phones have become an important need of today. The term mobile phone and smart phone are almost identical now - a-days. Smartphone market is booming with very high speed. Smartphones have gained such a huge popularity due to wide range of capabilities they offer. Currently android platform is leading the smartphone market.
Amit Jain, Pallavi Kaushik
openaire +1 more source
Mobile SDNs: Associating End‐User Commands with Network Flows in Android Devices
In our research, we combine user interface context with network flow data to improve network profiling on Android, achieving over 98.5% accuracy. We create “AppJudicator”, an Android access control app using host‐based SDN and default Android APIs, effectively addressing security concerns in enterprise networks.
Shuwen Liu +4 more
wiley +1 more source
The article proposes a novel concept of autonomous device protection based on behavioural profiling by continuously monitoring internal resource usage and exploiting a large language model to distinguish between benign and malicious behaviour. Abstract Demand for autonomous protection in computing devices cannot go unnoticed, considering the rapid ...
Sandeep Gupta, Bruno Crispo
wiley +1 more source
This paper addresses a critical gap in the literature of industrial robotics cybersecurity by presenting a comprehensive analysis of vulnerabilities in the sensing systems of industrial robots. In particular, we systematically explore how sensor performance limits, faults and biases can be exploited by attackers who can then turn these inherent ...
Abdul Kareem Shaik +2 more
wiley +1 more source
AEDroid: Adaptive Enhanced Android Malware Detection‐Based on Interpretability of Deep Learning
As the most widely used operating system in the world, Android has naturally become the main target of malicious hackers. The current research on Android malware detection relies on manually defined sensitive API feature sets. With the continuous innovation and change of malicious behavior, new threats and attack methods have emerged.
Pengfei Liu +5 more
wiley +1 more source
Backdoor Attack and Defense Methods for AI–Based IoT Intrusion Detection System
The Internet of Things (IoT) is an emerging technology that has attracted significant attention and triggered a technical revolution in recent years. Numerous IoT devices are directly connected to the physical world, such as security cameras and medical equipment, making IoT security a critical issue.
Bowen Ma +5 more
wiley +1 more source

