Identifying co-occurrences of message chains and member ignoring method in android applications using static program analysis and dynamic stacking ensemble. [PDF]
Ma Z, Bian Y, Chen W, Huang L.
europepmc +1 more source
Continuous Authentication in Resource-Constrained Devices via Biometric and Environmental Fusion. [PDF]
Zeeshan N +3 more
europepmc +1 more source
JDroid: Android malware detection using hybrid opcode feature vector. [PDF]
Arslan RS.
europepmc +1 more source
Entropy Extraction from Wearable Sensors for Secure Cryptographic Key Generation in Blockchain and IoT Systems. [PDF]
Švarcmajer M +3 more
europepmc +1 more source
The digital health revolution: transforming healthcare delivery through telemedicine in the post-pandemic era. [PDF]
Nawaz J, Rathi D, Kalam H.
europepmc +1 more source
Integrating transparency and privacy in grievance redressal through Hyperledger Fabric with multi-organization support. [PDF]
Kumar H +4 more
europepmc +1 more source
Data security storage and transmission framework for AI computing power platforms. [PDF]
Chen J +5 more
europepmc +1 more source
An accurate approach to discriminate android colluded malware from single app malware using permissions intelligence. [PDF]
Mawoh RY +4 more
europepmc +1 more source
Blockchain-Based Mobile App for Digital Identification of Older Adults in Rural Peru: Design and Usability Evaluation Study. [PDF]
Arana-Ramos W +2 more
europepmc +1 more source

