Results 71 to 80 of about 31,732 (193)

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

Malware Detection in IoT Networks Using Deep Learning Approach

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
In this study, we investigate the possibility of detecting IoT malware using deep learning and temporal convolutional networks (TCN). TCN is used in the proposed method to investigate the execution operation codes of ARM‐based Internet of Things apps (OpCodes). To train our algorithms, we employ a dataset of IoT applications that includes 281 malicious
Inam Ullah   +5 more
wiley   +1 more source

A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment

open access: yesFuture Internet
Mobile devices are frequent targets of malware due to the large volume of sensitive personal, financial, and corporate data they process. Traditional static, dynamic, and hybrid analysis methods are increasingly insufficient against evolving threats ...
Aysha Alfaw   +2 more
doaj   +1 more source

A Comparative Study of Decision Tree, RNNs and CNNs for Detection of False Data Injection Attacks in Cyber‐Physical Power Systems

open access: yesIET Cyber-Physical Systems: Theory &Applications, Volume 11, Issue 1, January/December 2026.
Intrusion detection for FDIAs is proposed using three approaches. (1) a stack‐based model containing an expansion decision tree and neural network, (2) recurrent neural networks (RNNs) and (3) convolutional neural networks (CNNs). The first two methods are based on the initial preprocessing of row instances, whereas the last one involves the time ...
Zeeshan Haider   +3 more
wiley   +1 more source

Modeling and Stability Analysis of Malware Propagation in Hierarchically Protected WSNs Based on Epidemiological Theory

open access: yesIET Control Theory &Applications, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel malware propagation model based on epidemiological theory, specifically tailored for hierarchically protected wireless sensor networks (WSNs). We classify nodes into strongly and weakly protected categories and establish a four‐state propagation dynamics model (susceptible, exposed, infected, and recovered) to simulate ...
Xuejin Zhu, Nan Fu
wiley   +1 more source

Android Malware Detection Using Support Vector Regression for Dynamic Feature Analysis

open access: yesInformation
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis ...
Nahier Aldhafferi
doaj   +1 more source

Malware Mobile Devices in Indonesia

open access: yesKnE Social Sciences, 2019
The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development.
Drajad Wiryawan   +5 more
openaire   +2 more sources

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

FedAnomDetect a Clustered Federated Learning Framework for Robust Anomaly Detection With Enhanced Privacy and Communication Efficiency

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley   +1 more source

Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security

open access: yesIET Smart Grid, Volume 9, Issue 1, January/December 2026.
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy