Android malware family classification and analysis: Current status and future directions
Android receives major attention from security practitioners and researchers due to the influx
number of malicious applications. For the past twelve years, Android malicious applications …
number of malicious applications. For the past twelve years, Android malicious applications …
Hydrogen consumption prediction of a fuel cell based system with a hybrid intelligent approach
Energy storage is one of the challenges of the electric sector. There are several different
technologies available for facing it, from the traditional ones to the most advanced. With the …
technologies available for facing it, from the traditional ones to the most advanced. With the …
Androidgyny: Reviewing clustering techniques for Android malware family classification
Thousands of malicious applications (apps) are created daily, modified with the aid of
automation tools, and released on the World Wide Web. Several techniques have been …
automation tools, and released on the World Wide Web. Several techniques have been …
Advanced visualization of intrusions in flows by means of Beta-Hebbian learning
Detecting intrusions in large networks is a highly demanding task. In order to reduce the
computation demand of analysing every single packet travelling along one of such networks …
computation demand of analysing every single packet travelling along one of such networks …
Intrusion detection with unsupervised techniques for network management protocols over smart grids
RA Vega Vega, P Chamoso-Santos… - Applied Sciences, 2020 - mdpi.com
The present research work focuses on overcoming cybersecurity problems in the Smart Grid.
Smart Grids must have feasible data capture and communications infrastructure to be able to …
Smart Grids must have feasible data capture and communications infrastructure to be able to …
Beta-hebbian learning for visualizing intrusions in flows
The present research work focuses on Intrusion Detection (ID), identifying “anomalous”
patterns that may be related to an attack to a system or a network. In order to detect such …
patterns that may be related to an attack to a system or a network. In order to detect such …
A novel ensemble beta-scale invariant map algorithm
This research presents a novel topology preserving map (TPM) called Weighted Voting
Supervision-Beta-Scale Invariant Map (WeVoS-Beta-SIM), based on the application of the …
Supervision-Beta-Scale Invariant Map (WeVoS-Beta-SIM), based on the application of the …
Analysis of the Seasonality in a Geothermal System Using Projectionist and Clustering Methods
The environmental impact caused by greenhouse gasses emissions derived from fossil
fuels, gives rise to the promotion of green policies. In this context, geothermal energy …
fuels, gives rise to the promotion of green policies. In this context, geothermal energy …
Dynamic Malware Detection Based on Embedded Models of Execution Signature Chain
I Karpachev, V Kazymyr - International scientific-practical conference, 2021 - Springer
Today, the most mobile devices, such as tablets, e-books, watches, fitness bracelets and etc.
operate under the Android OS. At the same time the Android OS can be considered as …
operate under the Android OS. At the same time the Android OS can be considered as …
Proposed Framework to Improving Performance of Familial Classification in Android Malware
FAO Alswaina - 2020 - search.proquest.com
Because of the recent developments in hardware and software technologies for mobile
phones, people depend on their smartphones more than ever before. Today, people …
phones, people depend on their smartphones more than ever before. Today, people …