Showing 741 - 760 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))', query time: 0.18s Refine Results
  1. 741
  2. 742
  3. 743
  4. 744

    Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU. by Heena Kauser Sk, Maria Anu V

    Published 2025-01-01
    “…The model extracts static features (permissions, API calls, intent filters) and dynamic features (system calls, network activity, inter-process communication) from Android APKs, enabling a comprehensive analysis of application behavior.The proposed model was trained and tested on the Drebin dataset, which includes 129,013 applications (5,560 malware and 123,453 benign).Performance evaluation against NMLA-AMDCEF, MalVulDroid, and LinRegDroid demonstrated that DBN-GRU achieved 98.7% accuracy, 98.5% precision, 98.9% recall, and an AUC of 0.99, outperforming conventional models.In addition, it exhibits faster preprocessing, feature extraction, and malware classification times, making it suitable for real-time deployment.By bridging static and dynamic detection methodologies, the DBN-GRU enhances malware detection capabilities while reducing false positives and computational overhead.These findings confirm the applicability of the proposed model in real-world Android security applications, offering a scalable and high-performance malware detection solution.…”
    Get full text
    Article
  5. 745
  6. 746
  7. 747

    Lightweight UAV Detection Method Based on IASL-YOLO by Huaiyu Yang, Bo Liang, Song Feng, Ji Jiang, Ao Fang, Chunyun Li

    Published 2025-04-01
    “…First, we design the CFE-AFPN network to streamline the architecture while boosting feature fusion capabilities across non-adjacent layers. …”
    Get full text
    Article
  8. 748
  9. 749
  10. 750
  11. 751
  12. 752
  13. 753
  14. 754
  15. 755
  16. 756
  17. 757
  18. 758
  19. 759
  20. 760