Results 41 to 50 of about 3,123 (222)
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam +3 more
wiley +1 more source
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak +2 more
doaj +1 more source
A Hybrid Approach for Android Malware Detection and Family Classification
With the increase in the popularity of mobile devices, malicious applications targeting Android platform have greatly increased. Malware is coded so prudently that it has become very complicated to identify.
Meghna Dhalaria, Ekta Gandotra
doaj +1 more source
Smart malware detection on Android [PDF]
AbstractNowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current commercial antivirus solutions use static signatures for malware detection, which may fail to ...
Laura Gheorghe +6 more
openaire +1 more source
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
Android OS devices are the most widely used mobile devices globally. The open-source nature and less restricted nature of the Android application store welcome malicious apps, which present risks for such devices.
Amerah Alabrah
doaj +1 more source
Android Fragmentation in Malware Detection
Abstract Differences between Android versions affect not only application developers but also make the task of securing Android harder, as it is not easy to keep track of updates. In this paper, we first systematically analyze the Android framework, which includes APIs and enforced manifest permissions to realize the inconsistency currently exists in
Long Nguyen-Vu, Jinung Ahn, Souhwan Jung
openaire +1 more source
Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley +1 more source
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley +1 more source
Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat +3 more
wiley +1 more source

