-
81
Botnet Detection Using Support Vector Machines with Artificial Fish Swarm Algorithm
Published 2014-01-01“…The botnet virus is a major threat to both personal computers and mobile devices; therefore, a method of botnet feature characterization is proposed in this study. …”
Get full text
Article -
82
UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted
Published 2025-01-01“…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
Get full text
Article -
83
A comprehensive review on the users’ identity privacy for 5G networks
Published 2022-03-01Get full text
Article -
84
High accuracy indoor positioning system using Galois field-based cryptography and hybrid deep learning
Published 2025-04-01Get full text
Article -
85
Enhanced Interactive Interior Spaces for Safe Design in Administrative Office Buildings
Published 2025-03-01“…The study resulted in a set of conclusions, including: 1- The interactive interior space is a new type of space capable of accommodating different functions and adapting to the requirements of the era and is mobile and adjustable to provide a comfortable interior environment that responds to the requirements of the era. 2- The interactive design is represented by a set of specific tools that function as a link between the determinants of the interior space and its modern technologies that interact with the user through sensors and computing everywhere to achieve a safe work environment and to provide safety and security requirements within the spaces. …”
Get full text
Article -
86
Evaluating Lightweight Transformers With Local Explainability for Android Malware Detection
Published 2025-01-01“…Mobile phones have evolved into powerful handheld computers, fostering a vast application ecosystem but also increasing security and privacy risks. …”
Get full text
Article -
87
-
88
Improving Face Presentation Attack Detection Through Deformable Convolution and Transfer Learning
Published 2025-01-01Get full text
Article -
89
Multidisciplinary Contributions and Research Trends in eHealth Scholarship (2000-2024): Bibliometric Analysis
Published 2025-06-01“…Researchers’ concerns for eHealth data security and privacy, including advanced access control and encryption methods, featured prominently in the maps, along with terminology related to health analytics. …”
Get full text
Article -
90
Detecting Obfuscated Malware Infections on Windows Using Ensemble Learning Techniques
Published 2025-01-01“…In the internet and smart devices era, malware detection has become crucial for system security. Obfuscated malware poses significant risks to various platforms, including computers, mobile devices, and IoT devices, by evading advanced security solutions. …”
Get full text
Article -
91
-
92
Retracted: An Enhanced Hybrid Glowworm Swarm Optimization Algorithm for Traffic-Aware Vehicular Networks
Published 2022-01-01Get full text
Article -
93
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…Continuous user authentication is critical to mobile device security, addressing vulnerabilities associated with traditional one-time authentication methods. …”
Get full text
Article -
94
SUBJECT MATTER EXPERTS’ FEEDBACK ON EXPERIMENTAL PROCEDURES TO MEASURE USER’S JUDGMENT ERRORS IN SOCIAL ENGINEERING ATTACKS
Published 2022-02-01“…Distracted users can fail to correctly distinguish the differences between legitimate and malicious emails or search engine results. Mobile phone users can have a more challenging time identifying malicious content due to the smaller screen size and the limited security features in mobile phone applications. …”
Get full text
Article -
95
PlantNet: Scalable Convolutional Neural Network for Image-Based Plant Disease Detection
Published 2025-01-01“…This performance enables prompt identification and management of plant health issues, contributing to improved crop resilience and food security. Furthermore, the system's scalability makes it suitable for deployment across various agricultural environments, including mobile-based and edge computing applications. …”
Get full text
Article -
96
Application of Multiple Deep Learning Architectures for Emotion Classification Based on Facial Expressions
Published 2025-02-01“…In contrast, lightweight models such as MobileNet V1 and ShuffleNet V2, while excelling in computational efficiency, faced limitations in accuracy, particularly in challenging emotion categories like “fear” and “disgust”. …”
Get full text
Article -
97
Robust Face Recognition Using Deep Learning and Ensemble Classification
Published 2025-01-01“…Existing methods often struggle to strike a balance between accuracy, computational efficiency, and robustness. Deep learning has become popular for automatically learning features through convolution layers. …”
Get full text
Article -
98
UNION: A Trust Model Distinguishing Intentional and Unintentional Misbehavior in Inter-UAV Communication
Published 2018-01-01“…Hence, the communications interface used and that computation complexity are additional factors to consider when designing secure protocols for these networks. …”
Get full text
Article -
99
-
100
SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification
Published 2025-01-01“…With its streamlined architecture, the model is both precise and computationally efficient, making it suitable for deployment on resource-constrained platforms like drones and mobile devices. …”
Get full text
Article