Results 51 to 60 of about 31,732 (193)
A Two-Layer Deep Learning Method for Android Malware Detection Using Network Traffic
Because of the characteristic of openness and flexibility, Android has become the most popular mobile platform. However, it has also become the most targeted system by mobile malware.
Jiayin Feng +4 more
doaj +1 more source
A Bayesian probability model for Android malware detection
The unprecedented growth of mobile technology has generated an increase in malware and raised concerns over malware threats. Different approaches have been adopted to overcome the malware attacks yet this spread is still increasing. To combat this issue,
Sharfah Ratibah Tuan Mat +4 more
doaj +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
Data‐Based Detection of Antagonistic Agents in a Robot Swarm Solving a Dynamic Coverage Task
ABSTRACT Robot swarms can be deployed as moving surveillance systems, for instance, as mobile anti‐poaching systems for monitoring wildlife and detecting poaching activities. Since poachers have an interest in evading detection, robots are at risk of being hijacked and manipulated to behave antagonistically, for example, to prevent the correct ...
Ingeborg Wenger +2 more
wiley +1 more source
Abstract Understanding the role of information communication technologies (ICTs) in development, especially in relation to marginalized populations, has been the focus of many related disciplinary categories within the broader ecosystem of information sciences.
Chidi Oguamanam
wiley +1 more source
The Influence of Big Data‐Driven Educational Technologies on College Teaching Development
Exploring the impact of big data on college instructors: enhancing teaching, fostering professional growth, and addressing challenges in data adoption and privacy. ABSTRACT The rapid development of big data and mobile Internet technologies has significantly influenced the instructional growth of college instructors. This study investigated how big data
Ling Yu, Wenye Li, Ying Luo
wiley +1 more source
Exploiting Vision Transformer and Ensemble Learning for Advanced Malware Classification
Overview of the proposed RF–ViT ensemble for multi‐class malware classification. Textual (BoW/byte‐frequency) and visual representations are combined via a product rule, achieving improved accuracy and robustness over individual models. ABSTRACT Malware remains a significant concern for modern digital systems, increasing the need for reliable and ...
Fadi Makarem +4 more
wiley +1 more source
A Study on the Digital Forensic Investigation Method of Clever Malware in IoT Devices
As IoT devices are always connected to mobile devices or other computing devices via the Internet, clever malwares targeting IoT devices or other computing devices connected to IoT devices are emerging.
Dohyun Kim, Yi Pan, Jong Hyuk Park
doaj +1 more source
A review of deep learning models to detect malware in Android applications
Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions.
Elliot Mbunge +3 more
doaj +1 more source

