[HTML][HTML] PermDroid a framework developed using proposed feature selection approach and machine learning techniques for Android malware detection

A Mahindru, H Arora, A Kumar, SK Gupta… - Scientific Reports, 2024 - nature.com
The challenge of developing an Android malware detection framework that can identify
malware in real-world apps is difficult for academicians and researchers. The vulnerability …

Hybrid machine learning model for malware analysis in android apps

S Bashir, F Maqbool, FH Khan, AS Abid - Pervasive and Mobile Computing, 2024 - Elsevier
Android smartphones have been widely adopted across the globe. They have the capability
to access private and confidential information resulting in these devices being targeted by …

: A Case-Sensitive Detection Engine to Counter Malware Diversity

S Karapoola, N Singh, C Rebeiro… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Malware programs are diverse, with varying objectives, functionalities, and threat levels
ranging from mere pop-ups to significant financial losses. Consequently, their run-time …

[HTML][HTML] Surveying the prediction of risks in cryptocurrency investments using recurrent neural networks

R Qasim Abdulkadhim, HS Abdullah, MJ Hadi - Open Engineering, 2024 - degruyter.com
Decentralized cryptocurrencies have received much attention over the last few years. Bitcoin
(BTC) has enabled straight online expenditures without the need for centralized financial …

Malware Attacks Detection in IoT Using Recurrent Neural Network (RNN).

AA Alsadhan, AA Al-Atawi, A Jameel… - … Automation & Soft …, 2024 - search.ebscohost.com
Abstract IoT (Internet of Things) devices are being used more and more in a variety of
businesses and for a variety of tasks, such as environmental data collection in both civilian …

Personalized Learning Resource Push Evaluation Considering Image Big Data Processing Technology

D Wu - Informatica, 2024 - informatica.si
With the continuous development of the social economy, the ways of obtaining learning
materials and learning resources have gradually increased, especially the development of …

SECURITY IN IOT: SYSTEMATIC REVIEW

K TEJASVI, R BEGUM… - The Fusion of Artificial …, 2024 - books.google.com
IoT platforms have grown into a worldwide powerhouse over the past ten years that
dominates boosting human existence with its uncontrolled smart services throughout every …

Highly Efficient System of Spam Detection for IoT Gadgets with the Help of ML

E Sujatha, PD Prabhu - Disruptive Technologies for Sustainable …, 2024 - taylorfrancis.com
IoT stands for Internet of things. This is a special technology whereby the group comprising
gadgets in large numbers with various sensors and the actuators. These sensors and …

[PDF][PDF] Information Security against Malware Activities using AI Models

MAB Parmar, KN Brahmbhatt - 2024 - gtusitecirculars.s3.amazonaws.com
Malware attacks are becoming increasingly difficult to detect using traditional methods
because they constantly evolve and change their binary content. It makes it difficult for …

[PDF][PDF] Evaluation System Construction Industry for Kindergarten Teachers based on Digital Big Data Art

N Li - 2024 - cad-journal.net
In order to improve the development evaluation effect of kindergarten teachers, this paper
analyzes the problems existing in the current development evaluation of kindergarten …