4.7 Article

DeepAMD: Detection and identification of Android malware using high-efficient Deep Artificial Neural Network

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

PARCIV: Recognizing physical activities having complex interclass variations using semantic data of smartphone

Muhammad Usman Sarwar et al.

Summary: The research proposes a two-layered approach to improve accurate recognition of physical activities with complex interclass variations. By clustering and using a machine learning classifier, the method achieves a 99% accuracy on a self-collected dataset and 95% accuracy on a publicly available dataset. PARCIV outperforms various state-of-the-art studies by 8%-17% for both simple and complex activities.

SOFTWARE-PRACTICE & EXPERIENCE (2021)

Article Telecommunications

Analysis of security and energy efficiency for shortest route discovery in low-energy adaptive clustering hierarchy protocol using Levenberg-Marquardt neural network and gated recurrent unit for intrusion detection system

Mohit Mittal et al.

Summary: This article explores the selection of cluster head nodes and shortest path discovery algorithms in wireless sensor networks using the LEACH-LMNN protocol. The results show that the LEACH-LMNN protocol with the Dijkstra shortest path algorithm outperforms other route discovery algorithms. Additionally, using the gated mechanism of LSTM and GRU can achieve high detection rate and reduce false positive rate in intrusion detection systems for wireless sensor networks.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2021)

Article Computer Science, Information Systems

Intelligent Reward-Based Data Offloading in Next-Generation Vehicular Networks

Gunasekaran Raja et al.

IEEE INTERNET OF THINGS JOURNAL (2020)

Article Computer Science, Information Systems

IoT malicious traffic identification using wrapper-based feature selection mechanisms

Muhammad Shafiq et al.

COMPUTERS & SECURITY (2020)

Article Computer Science, Information Systems

KeySplitWatermark: Zero Watermarking Algorithm for Software Protection Against Cyber-Attacks

Celestine Iwendi et al.

IEEE ACCESS (2020)

Article Computer Science, Information Systems

Research on data mining of permissions mode for Android malware detection

Chao Wang et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Article Computer Science, Information Systems

Detecting sensitive data leakage via inter-applications on Android using a hybrid analysis technique

Nguyen Tan Cam et al.

CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS (2019)

Proceedings Paper Computer Science, Theory & Methods

Personal Volunteer Computing

Erick Lavoie et al.

CF '19 - PROCEEDINGS OF THE 16TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS (2019)

Article Computer Science, Information Systems

AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection

Ali Feizollah et al.

COMPUTERS & SECURITY (2017)

Article Computer Science, Information Systems

Droiddetector: android malware characterization and detection using deep learning

Zhenlong Yuan et al.

TSINGHUA SCIENCE AND TECHNOLOGY (2016)

Proceedings Paper Computer Science, Theory & Methods

Experimental Analysis of Ransomware on Windows and Android Platforms: Evolution and Characterization

Monika et al.

11TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2016) / THE 13TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2016) / AFFILIATED WORKSHOPS (2016)

Article Computer Science, Information Systems

Droid-Sec: Deep Learning in Android Malware Detection

Zhenlong Yuan et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)