Results 41 to 50 of about 3,123 (222)

Securing the Unseen: A Comprehensive Exploration Review of AI‐Powered Models for Zero‐Day Attack Detection

open access: yesExpert Systems, Volume 43, Issue 3, March 2026.
ABSTRACT Zero‐day exploits remain challenging to detect because they often appear in unknown distributions of signatures and rules. The article entails a systematic review and cross‐sectional synthesis of four fundamental model families for identifying zero‐day intrusions, namely, convolutional neural networks (CNN), deep neural networks (DNN ...
Abdullah Al Siam   +3 more
wiley   +1 more source

Static analysis framework for permission-based dataset generation and android malware detection using machine learning

open access: yesEURASIP Journal on Information Security
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak   +2 more
doaj   +1 more source

A Hybrid Approach for Android Malware Detection and Family Classification

open access: yesInternational Journal of Interactive Multimedia and Artificial Intelligence, 2021
With the increase in the popularity of mobile devices, malicious applications targeting Android platform have greatly increased. Malware is coded so prudently that it has become very complicated to identify.
Meghna Dhalaria, Ekta Gandotra
doaj   +1 more source

Smart malware detection on Android [PDF]

open access: yesSecurity and Communication Networks, 2015
AbstractNowadays, because of its increased popularity, Android is target to a growing number of attacks and malicious applications, with the purpose of stealing private information and consuming credit by subscribing to premium services. Most of the current commercial antivirus solutions use static signatures for malware detection, which may fail to ...
Laura Gheorghe   +6 more
openaire   +1 more source

Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification

open access: yesEngineering Reports, Volume 8, Issue 1, January 2026.
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem   +4 more
wiley   +1 more source

A Novel Neural Network Architecture Using Automated Correlated Feature Layer to Detect Android Malware Applications

open access: yesMathematics, 2023
Android OS devices are the most widely used mobile devices globally. The open-source nature and less restricted nature of the Android application store welcome malicious apps, which present risks for such devices.
Amerah Alabrah
doaj   +1 more source

Android Fragmentation in Malware Detection

open access: yesComputers & Security, 2019
Abstract Differences between Android versions affect not only application developers but also make the task of securing Android harder, as it is not easy to keep track of updates. In this paper, we first systematically analyze the Android framework, which includes APIs and enforced manifest permissions to realize the inconsistency currently exists in
Long Nguyen-Vu, Jinung Ahn, Souhwan Jung
openaire   +1 more source

Securing End‐To‐End Encrypted File Sharing Services With the Messaging Layer Security Protocol

open access: yesConcurrency and Computation: Practice and Experience, Volume 37, Issue 27-28, 25 December 2025.
ABSTRACT Secure file sharing is essential in today's digital environment, yet many systems remain vulnerable: if an attacker steals client keys, they can often decrypt both past and future content. To address this challenge, we propose a novel file‐sharing architecture that strengthens post‐compromise security while remaining practical.
Roland Helmich, Lars Braubach
wiley   +1 more source

AInsectID Version 1.1: An Insect Species Identification Software Based on the Transfer Learning of Deep Convolutional Neural Networks

open access: yesAdvanced Intelligent Discovery, Volume 1, Issue 2, August 2025.
This paper describes the basis for AInsectID Version 1, a GUI‐operable open‐source insect species identification, color processing, and image analysis software. This paper discusses our methods of algorithmic development, coupled to rigorous machine training used to enable high levels of validation accuracy.
Haleema Sadia, Parvez Alam
wiley   +1 more source

Security in Metaverse Markets: Challenges and Solutions—A Comprehensive Review

open access: yesExpert Systems, Volume 42, Issue 8, August 2025.
ABSTRACT This review paper provides a systematic overview of the metaverse markets security problems and solutions. The metaverse is an emerging digital space, bridging virtual, augmented and mixed reality environments. As the metaverse evolves, issues related to customer security have emerged, which include breaches of privacy, thefts of identity and ...
Mohammad Z. Aloudat   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy