Blockchain technology in supply chain management: an empirical study of the factors affecting user adoption/acceptance
Blockchain overcomes numerous complicated problems related to confidentiality, integrity,
availability of fast and secure distributed systems. Using data from a cross-sectoral survey of …
availability of fast and secure distributed systems. Using data from a cross-sectoral survey of …
COVID-19 prediction and detection using deep learning
Currently, the detection of coronavirus disease 2019 (COVID-19) is one of the main
challenges in the world, given the rapid spread of the disease. Recent statistics indicate that …
challenges in the world, given the rapid spread of the disease. Recent statistics indicate that …
Intelligent mobile malware detection using permission requests and API calls
Malware is a serious threat that has been used to target mobile devices since its inception.
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …
IoT vulnerability assessment for sustainable computing: threats, current solutions, and open challenges
Over the last few decades, sustainable computing has been widely used in areas like social
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
computing, artificial intelligence-based agent systems, mobile computing, and Internet of …
Black-hole attack mitigation in medical sensor networks using the enhanced gravitational search algorithm
RK Dhanaraj, RH Jhaveri, L Krishnasamy… - … Journal of Uncertainty …, 2021 - World Scientific
In today's world, one of the most severe attacks that wireless sensor networks (WSNs) face is
a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …
a Black-Hole (BH) attack which is a type of Denial of Service (DoS) attack. This attack blocks …
Mining permission patterns for contrasting clean and malicious android applications
An Android application uses a permission system to regulate the access to system resources
and users' privacy-relevant information. Existing works have demonstrated several …
and users' privacy-relevant information. Existing works have demonstrated several …
[PDF][PDF] Free for all! assessing user data exposure to advertising libraries on android.
Many studies focused on detecting and measuring the security and privacy risks associated
with the integration of advertising libraries in mobile apps. These studies consistently …
with the integration of advertising libraries in mobile apps. These studies consistently …
Android malware detection using complex-flows
F Shen, J Del Vecchio, A Mohaisen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This paper proposes a new technique to detect mobile malware based on information flow
analysis. Our approach examines the structure of information flows to identify patterns of …
analysis. Our approach examines the structure of information flows to identify patterns of …
Automated malware detection in mobile app stores based on robust feature generation
M Alazab - Electronics, 2020 - mdpi.com
Many Internet of Things (IoT) services are currently tracked and regulated via mobile
devices, making them vulnerable to privacy attacks and exploitation by various malicious …
devices, making them vulnerable to privacy attacks and exploitation by various malicious …
Classification of COVID‐19 and Pneumonia Using Deep Transfer Learning
The World Health Organization (WHO) recognized COVID‐19 as the cause of a global
pandemic in 2019. COVID‐19 is caused by SARS‐CoV‐2, which was identified in China in …
pandemic in 2019. COVID‐19 is caused by SARS‐CoV‐2, which was identified in China in …