Android malware family classification and analysis: Current status and future directions

F Alswaina, K Elleithy - Electronics, 2020 - mdpi.com
Android receives major attention from security practitioners and researchers due to the influx
number of malicious applications. For the past twelve years, Android malicious applications …

Hydrogen consumption prediction of a fuel cell based system with a hybrid intelligent approach

JA Montero-Sousa, H Aláiz-Moretón, H Quintián… - Energy, 2020 - Elsevier
Energy storage is one of the challenges of the electric sector. There are several different
technologies available for facing it, from the traditional ones to the most advanced. With the …

Androidgyny: Reviewing clustering techniques for Android malware family classification

TSR Pimenta, F Ceschin, A Gregio - Digital Threats: Research and …, 2024 - dl.acm.org
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …

Advanced visualization of intrusions in flows by means of Beta-Hebbian learning

H Quintián, E Jove, JL Casteleiro-Roca… - Logic Journal of the …, 2022 - academic.oup.com
Detecting intrusions in large networks is a highly demanding task. In order to reduce the
computation demand of analysing every single packet travelling along one of such networks …

Intrusion detection with unsupervised techniques for network management protocols over smart grids

RA Vega Vega, P Chamoso-Santos… - Applied Sciences, 2020 - mdpi.com
The present research work focuses on overcoming cybersecurity problems in the Smart Grid.
Smart Grids must have feasible data capture and communications infrastructure to be able to …

Beta-hebbian learning for visualizing intrusions in flows

H Quintián, E Jove, JL Casteleiro-Roca, D Urda… - … Intelligence in Security …, 2021 - Springer
The present research work focuses on Intrusion Detection (ID), identifying “anomalous”
patterns that may be related to an attack to a system or a network. In order to detect such …

A novel ensemble beta-scale invariant map algorithm

H Quintián, E Corchado - IEEE Access, 2020 - ieeexplore.ieee.org
This research presents a novel topology preserving map (TPM) called Weighted Voting
Supervision-Beta-Scale Invariant Map (WeVoS-Beta-SIM), based on the application of the …

Analysis of the Seasonality in a Geothermal System Using Projectionist and Clustering Methods

S Porras, E Jove, B Baruque, JL Calvo-Rolle - Hybrid Artificial Intelligent …, 2021 - Springer
The environmental impact caused by greenhouse gasses emissions derived from fossil
fuels, gives rise to the promotion of green policies. In this context, geothermal energy …

Dynamic Malware Detection Based on Embedded Models of Execution Signature Chain

I Karpachev, V Kazymyr - International scientific-practical conference, 2021 - Springer
Today, the most mobile devices, such as tablets, e-books, watches, fitness bracelets and etc.
operate under the Android OS. At the same time the Android OS can be considered as …

Proposed Framework to Improving Performance of Familial Classification in Android Malware

FAO Alswaina - 2020 - search.proquest.com
Because of the recent developments in hardware and software technologies for mobile
phones, people depend on their smartphones more than ever before. Today, people …