P Ewoh, T Vartiainen - Journal of medical internet research, 2024 - jmir.org
Background Health care organizations worldwide are faced with an increasing number of cyberattacks and threats to their critical infrastructure. These cyberattacks cause significant …
This study investigates the criminal use and abuse of artificial intelligence (AI), exploring the effectiveness of various mitigation strategies. It employs a mixed-methods approach …
The rise and exponential growth in complexity and widespread use of Android mobile devices have resulted in corresponding detrimental consequences within the realm of cyber …
Ransomware, particularly crypto ransomware, has emerged as the go-to malware for threat actors aiming to compromise data on Android devices as well as in general. In this paper …
The challenge of developing an Android malware detection framework that can identify malware in real-world apps is difficult for academicians and researchers. The vulnerability …
Fleeceware, a novel category of malicious subscription apps, is increasingly tricking users into expensive subscriptions, leading to substantial financial consequences. These apps' …
A Kar, N Stakhanova, E Branca - Procedia Computer Science, 2024 - Elsevier
Overlay attacks have long been a significant security concern affecting Android devices. Despite Android touch prevention mechanisms for external apps, internal apps and those …
Android OS is a widely-used platform for mobile devices. However, with the increasing number of Android applications and ongoing advancements in application development …
Android malware detection serves as the front line against malicious apps. With the rapid advancement of machine learning (ML), ML-based Android malware detection has attracted …