According to the recent studies, malicious software (malware) is increasing at an alarming rate, and some malware can hide in the system by using different obfuscation techniques. In …
K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android malware is also emerging in an endless stream. Many researchers have studied the …
The main objective of feature selection is to improve learning performance by selecting concise and informative feature subsets, which presents a challenging task for machine …
Internet of Things (IoT) in military settings generally consists of a diverse range of Internet- connected devices and nodes (eg, medical devices and wearable combat uniforms). These …
M Sharma, P Kaur - Archives of Computational Methods in Engineering, 2021 - Springer
Meta-heuristics are problem-independent optimization techniques which provide an optimal solution by exploring and exploiting the entire search space iteratively. These techniques …
The blockchain is a technology which accumulates and compiles data into a chain of multiple blocks. Many blockchain researchers are adopting it in multiple areas. However …
A pervasive increase in the adoption rate of smartphones with Android OS is noted in recent years. Android's popular and attractive environment not only captured the attention of users …
The wide popularity of Android systems has been accompanied by increase in the number of malware targeting these systems. This is largely due to the open nature of the Android …
Ransomware is malware that encrypts the victim's data and demands a ransom for a decryption key. The increasing number of ransomware families and their variants renders …