Results 11 to 20 of about 31,732 (193)
A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments [PDF]
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to ...
Jannatul Ferdous +3 more
doaj +4 more sources
Malware detection techniques for mobile devices [PDF]
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +2 more sources
DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware. [PDF]
To deal with the large number of malicious mobile applications (e.g. mobile malware), a number of malware detection systems have been proposed in the literature. In this paper, we propose a hybrid method to find the optimum parameters that can be used to
Firdaus Afifi +3 more
doaj +2 more sources
Coevolution of Mobile Malware and Anti-Malware
Mobile malware is one of today's greatest threats in computer security. Furthermore, new mobile malware is emerging daily that introduces new security risks. However, while existing security solutions generally protect mobile devices against known risks, they are vulnerable to as yet unknown risks.
Sevil Sen, Emre Aydogan, Ahmet I. Aysan
openaire +4 more sources
Graph-augmented multi-modal learning framework for robust android malware detection [PDF]
The widespread adoption of Android has made it a primary target for increasingly sophisticated malware, posing a significant challenge to mobile security.
Muhammad Usama Tanveer +5 more
doaj +2 more sources
Mobile application security: malware threats and defenses
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks.
He, Daojing +2 more
openaire +5 more sources
Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj +1 more source
DroidEnemy: Battling adversarial example attacks for Android malware detection
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala +5 more
doaj +1 more source
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools.
Niusen Chen, Bo Chen
doaj +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source

