Results 81 to 90 of about 11,847 (201)
Recently, some clinicians have been diagnosing and treating arrhythmias on the basis of electrocardiogram (ECG) devices with low accuracy. In Europe and the US, several statements on the use of ECGs have already been published by related academic societies.
Takanori Ikeda +22 more
wiley +1 more source
Android malware detection: An eigenspace analysis approach [PDF]
7 pages, 4 figures ...
Yerima, Suleiman Y. +2 more
openaire +3 more sources
TMaD: Three‐tier malware detection using multi‐view feature for secure convergence ICT environments
Abstract As digital transformation accelerates, data generated in a convergence information and communication technology (ICT) environment must be secured. This data includes confidential information such as personal and financial information, so attackers spread malware in convergence ICT environments to steal this information.
Jueun Jeon +3 more
wiley +1 more source
Malware Detection Techniques in Android
Phones have become an important need of today. The term mobile phone and smart phone are almost identical now - a-days. Smartphone market is booming with very high speed. Smartphones have gained such a huge popularity due to wide range of capabilities they offer. Currently android platform is leading the smartphone market.
Amit Jain, Pallavi Kaushik
openaire +1 more source
R2-D2: ColoR-inspired Convolutional NeuRal Network (CNN)-based AndroiD Malware Detections
The influence of Deep Learning on image identification and natural language processing has attracted enormous attention globally. The convolution neural network that can learn without prior extraction of features fits well in response to the rapid ...
Huang, TonTon Hsien-De, Kao, Hung-Yu
core +1 more source
The advent of the Internet of Things (IoT) has revolutionized the concept of smart homes, allowing users to remotely interact with their houses. This technological development has significantly improved convenience, safety, and overall lifestyles for homeowners.
Absalom E. Ezugwu +10 more
wiley +1 more source
Research on Data Mining of Permission-Induced Risk for Android IoT Devices
With the growing era of the Internet of Things (IoT), more and more devices are connecting with the Internet using android applications to provide various services.
Rajesh Kumar +3 more
doaj +1 more source
Abstract The Internet of Things (IoT) effortlessly enables communication between items on the World Wide Web and other systems. This extensive use of IoTs has created new services and automation in numerous industries, enhancing the standard of living, especially in healthcare.
Ehtesham Safeer +5 more
wiley +1 more source
AMALGAN: Image‐Based Android Malware Classification Using Generative Adversarial Network
The Android malware detection process requires analysing numerous files to ensure system security. Malware can also be embedded in media files and images.
Zahid Hussain Qaisar +2 more
doaj +1 more source
With the increasing popularity of Android smartphones, malware targeting the Android platform is showing explosive growth. Currently, mainstream detection methods use static analysis methods to extract features of the software and apply machine learning ...
Shuncheng Zhou +4 more
doaj +1 more source

