Showing 81 - 100 results of 115 for search 'Mobile computing Security features.', query time: 0.13s Refine Results
  1. 81

    Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm by Kuan-Cheng Lin, Sih-Yang Chen, Jason C. Hung

    Published 2014-01-01
    “…The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
    Get full text
    Article
  2. 82

    UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted by Chunpeng Liu, Tao Huang, Maode Ma

    Published 2025-01-01
    “…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
    Get full text
    Article
  3. 83
  4. 84
  5. 85

    Enhanced Interactive Interior Spaces for Safe Design in Administrative Office Buildings by Shatha Abd Abd Ali, Faten Abbas Lafta

    Published 2025-03-01
    “…The study resulted in a set of conclusions, including: 1- The interactive interior space is a new type of space capable of accommodating different functions and adapting to the requirements of the era and is mobile and adjustable to provide a comfortable interior environment that responds to the requirements of the era. 2- The interactive design is represented by a set of specific tools that function as a link between the determinants of the interior space and its modern technologies that interact with the user through sensors and computing everywhere to achieve a safe work environment and to provide safety and security requirements within the spaces. …”
    Get full text
    Article
  6. 86

    Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection by Fatima Bourebaa, Mohamed Benmohammed

    Published 2025-01-01
    “…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
    Get full text
    Article
  7. 87
  8. 88
  9. 89

    Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis by Lana V Ivanitskaya, Dimitrios Zikos, Elina Erzikova

    Published 2025-06-01
    “…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
    Get full text
    Article
  10. 90

    Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques by Yadigar Imamverdiyev, Elshan Baghirov, John Chukwu Ikechukwu

    Published 2025-01-01
    “…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
    Get full text
    Article
  11. 91
  12. 92
  13. 93

    Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors by Bandar Alotaibi, Munif Alotaibi

    Published 2025-04-01
    “…Continuous user authentication is critical to mobile device security, addressing vulnerabilities associated with traditional one-time authentication methods. …”
    Get full text
    Article
  14. 94

    SUBJECT MATTER EXPERTS’ FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS by Tommy Pollock, Yair Levy, Wei Li, Ajoy Kumar

    Published 2022-02-01
    “…Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. …”
    Get full text
    Article
  15. 95

    PlantNet: Scalable Convolutional Neural Network for Image-Based Plant Disease Detection by Sinha Anupa, Kumaraswamy Balasubramaniam

    Published 2025-01-01
    “…This performance enables prompt identification and management of plant health issues, contributing to improved crop resilience and food security. Furthermore, the system's scalability makes it suitable for deployment across various agricultural environments, including mobile-based and edge computing applications. …”
    Get full text
    Article
  16. 96

    Application of Multiple Deep Learning Architectures for Emotion Classification Based on Facial Expressions by Cheng Qian, João Alexandre Lobo Marques, Auzuir Ripardo de Alexandria, Simon James Fong

    Published 2025-02-01
    “…In contrast, lightweight models such as MobileNet V1 and ShuffleNet V2, while excelling in computational efficiency, faced limitations in accuracy, particularly in challenging emotion categories like “fear” and “disgust”. …”
    Get full text
    Article
  17. 97

    Robust Face Recognition Using Deep Learning and Ensemble Classification by Pavani Chitrapu, Mahesh Kumar Morampudi, Hemantha Kumar Kalluri

    Published 2025-01-01
    “…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
    Get full text
    Article
  18. 98

    UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication by Ezedin Barka, Chaker Abdelaziz Kerrache, Nasreddine Lagraa, Abderrahmane Lakas, Carlos T. Calafate, Juan-Carlos Cano

    Published 2018-01-01
    “…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
    Get full text
    Article
  19. 99
  20. 100

    SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification by Nayak Ashu, Raghatate Kapesh Subhash

    Published 2025-01-01
    “…With its streamlined architecture, the model is both precise and computationally efficient, making it suitable for deployment on resource-constrained platforms like drones and mobile devices. …”
    Get full text
    Article