Results 131 to 140 of about 31,732 (193)
Prediction of android ransomware with deep learning model using hybrid cryptography. [PDF]
Kalphana KR +7 more
europepmc +1 more source
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning. [PDF]
Younas N +5 more
europepmc +1 more source
A threat modeling framework for IoT-Based botnet attacks. [PDF]
Jin H +4 more
europepmc +1 more source
ViTDroid: Vision Transformers for Efficient, Explainable Attention to Malicious Behavior in Android Binaries. [PDF]
Syed TA +4 more
europepmc +1 more source
A malware classification method based on directed API call relationships. [PDF]
Ma C, Li Z, Long H, Bilal A, Liu X.
europepmc +1 more source
Open source tools: an evaluation for digital forensic investigations. [PDF]
Abeysekera I.
europepmc +1 more source
DLCDroid an android apps analysis framework to analyse the dynamically loaded code. [PDF]
Bhan R +6 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A survey on dynamic mobile malware detection
Software Quality Journal, 2017The outstanding advances of mobile devices stimulate their wide usage. Since mobile devices are coupled with third-party applications, lots of security and privacy problems are induced. However, current mobile malware detection and analysis technologies are still imperfect, ineffective, and incomprehensive. Due to the specific characteristics of mobile
Ping Yan, Zheng Yan
openaire +3 more sources
2021 IEEE International Conference on Electro Information Technology (EIT), 2021
Mobile devices have exploded in popularity in the past decades due to their ability to function in both people’s personal lives as well as the business world. Having a computer in your pocket that can let you connect with people around the world and give you access to any information with a few taps presents both good and bad possibilities.
Nikolay Atanassov, MD Minhaz Chowdhury
openaire +1 more source
Mobile devices have exploded in popularity in the past decades due to their ability to function in both people’s personal lives as well as the business world. Having a computer in your pocket that can let you connect with people around the world and give you access to any information with a few taps presents both good and bad possibilities.
Nikolay Atanassov, MD Minhaz Chowdhury
openaire +1 more source
Digital Forensics (4n6) Journal, 2020
Mobile Malware has been quite a trending topic for the last few years and also been a big threat to the mobile ecosystems. The malware are pretty much hard to detect, has lined up a vast amount of threats and quite favoured among Cybercriminals. Advertising is very important tools for companies whose products and services are targeted at mass consumer ...
openaire +1 more source
Mobile Malware has been quite a trending topic for the last few years and also been a big threat to the mobile ecosystems. The malware are pretty much hard to detect, has lined up a vast amount of threats and quite favoured among Cybercriminals. Advertising is very important tools for companies whose products and services are targeted at mass consumer ...
openaire +1 more source

