Results 11 to 20 of about 31,732 (193)

A Survey on ML Techniques for Multi-Platform Malware Detection: Securing PC, Mobile Devices, IoT, and Cloud Environments [PDF]

open access: yesSensors
Malware has emerged as a significant threat to end-users, businesses, and governments, resulting in financial losses of billions of dollars. Cybercriminals have found malware to be a lucrative business because of its evolving capabilities and ability to ...
Jannatul Ferdous   +3 more
doaj   +4 more sources

Malware detection techniques for mobile devices [PDF]

open access: yesSSRN Electronic Journal, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +2 more sources

DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware. [PDF]

open access: yesPLoS ONE, 2016
To deal with the large number of malicious mobile applications (e.g. mobile malware), a number of malware detection systems have been proposed in the literature. In this paper, we propose a hybrid method to find the optimum parameters that can be used to
Firdaus Afifi   +3 more
doaj   +2 more sources

Coevolution of Mobile Malware and Anti-Malware

open access: yesIEEE Transactions on Information Forensics and Security, 2018
Mobile malware is one of today's greatest threats in computer security. Furthermore, new mobile malware is emerging daily that introduces new security risks. However, while existing security solutions generally protect mobile devices against known risks, they are vulnerable to as yet unknown risks.
Sevil Sen, Emre Aydogan, Ahmet I. Aysan
openaire   +4 more sources

Graph-augmented multi-modal learning framework for robust android malware detection [PDF]

open access: yesScientific Reports
The widespread adoption of Android has made it a primary target for increasingly sophisticated malware, posing a significant challenge to mobile security.
Muhammad Usama Tanveer   +5 more
doaj   +2 more sources

Mobile application security: malware threats and defenses

open access: yesIEEE Wireless Communications, 2015
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for users to download and install. However, it also means hackers can easily distribute malware to smartphones, launching various attacks.
He, Daojing   +2 more
openaire   +5 more sources

Analysis of Mobile Malware: A Systematic Review of Evolution and Infection Strategies

open access: yesJournal of Information Security and Cybercrimes Research, 2021
The open-source and popularity of Android attracts hackers and has multiplied security concerns targeting devices. As such, malware attacks on Android are one of the security challenges facing society.
Ashawa Moses, Sarah Morris
doaj   +1 more source

DroidEnemy: Battling adversarial example attacks for Android malware detection

open access: yesDigital Communications and Networks, 2022
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala   +5 more
doaj   +1 more source

Defending against OS-Level Malware in Mobile Devices via Real-Time Malware Detection and Storage Restoration

open access: yesJournal of Cybersecurity and Privacy, 2022
Combating the OS-level malware is a very challenging problem as this type of malware can compromise the operating system, obtaining the kernel privilege and subverting almost all the existing anti-malware tools.
Niusen Chen, Bo Chen
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Home - About - Disclaimer - Privacy