Results 71 to 80 of about 31,732 (193)
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
Malware Detection in IoT Networks Using Deep Learning Approach
In this study, we investigate the possibility of detecting IoT malware using deep learning and temporal convolutional networks (TCN). TCN is used in the proposed method to investigate the execution operation codes of ARM‐based Internet of Things apps (OpCodes). To train our algorithms, we employ a dataset of IoT applications that includes 281 malicious
Inam Ullah +5 more
wiley +1 more source
A Resilient Deep Learning Framework for Mobile Malware Detection: From Architecture to Deployment
Mobile devices are frequent targets of malware due to the large volume of sensitive personal, financial, and corporate data they process. Traditional static, dynamic, and hybrid analysis methods are increasingly insufficient against evolving threats ...
Aysha Alfaw +2 more
doaj +1 more source
Intrusion detection for FDIAs is proposed using three approaches. (1) a stack‐based model containing an expansion decision tree and neural network, (2) recurrent neural networks (RNNs) and (3) convolutional neural networks (CNNs). The first two methods are based on the initial preprocessing of row instances, whereas the last one involves the time ...
Zeeshan Haider +3 more
wiley +1 more source
This paper proposes a novel malware propagation model based on epidemiological theory, specifically tailored for hierarchically protected wireless sensor networks (WSNs). We classify nodes into strongly and weakly protected categories and establish a four‐state propagation dynamics model (susceptible, exposed, infected, and recovered) to simulate ...
Xuejin Zhu, Nan Fu
wiley +1 more source
Android Malware Detection Using Support Vector Regression for Dynamic Feature Analysis
Mobile devices face significant security challenges due to the increasing proliferation of Android malware. This study introduces an innovative approach to Android malware detection, combining Support Vector Regression (SVR) and dynamic feature analysis ...
Nahier Aldhafferi
doaj +1 more source
Malware Mobile Devices in Indonesia
The number of mobile devices and information technology supporting applications is currently very diverse. Ranging from expensive to cheap, even new and used. On the other hand, the increase in connections needed every year always increases along with its development.
Drajad Wiryawan +5 more
openaire +2 more sources
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
Anomaly detection in distributed environments poses significant challenges, particularly in balancing privacy, communication overhead, and detection accuracy. This paper presents FedAnomDetect, a novel federated learning (FL‐based framework designed for anomaly detection across large‐scale, distributed systems.
Abeer Abdullah Alsadhan, Peican Zhu
wiley +1 more source
Digital Transformation of Energy Systems: Technologies, Data, Governance and Cyber Security
A comprehensive review of the digital transformation of modern energy systems through the integration of technologies such as the Internet of Things (IoT), artificial intelligence (AI) and digital twin frameworks. This paper investigates how digitalisation in the energy sector contributes to achieving net‐zero emissions by enhancing operational ...
Zoya Pourmirza +4 more
wiley +1 more source

