Showing 741 - 760 results of 836 for search 'computer network security features.', query time: 0.13s Refine Results
  1. 741
  2. 742
  3. 743
  4. 744
  5. 745

    Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives by Pranav Ratta, Amanpreet Kaur, Sparsh Sharma, Mohammad Shabaz, Gaurav Dhiman

    Published 2021-01-01
    “…Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. …”
    Get full text
    Article
  6. 746
  7. 747
  8. 748
  9. 749

    Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU. by Heena Kauser Sk, Maria Anu V

    Published 2025-01-01
    “…The model extracts static features (permissions, API calls, intent filters) and dynamic features (system calls, network activity, inter-process communication) from Android APKs, enabling a comprehensive analysis of application behavior.The proposed model was trained and tested on the Drebin dataset, which includes 129,013 applications (5,560 malware and 123,453 benign).Performance evaluation against NMLA-AMDCEF, MalVulDroid, and LinRegDroid demonstrated that DBN-GRU achieved 98.7% accuracy, 98.5% precision, 98.9% recall, and an AUC of 0.99, outperforming conventional models.In addition, it exhibits faster preprocessing, feature extraction, and malware classification times, making it suitable for real-time deployment.By bridging static and dynamic detection methodologies, the DBN-GRU enhances malware detection capabilities while reducing false positives and computational overhead.These findings confirm the applicability of the proposed model in real-world Android security applications, offering a scalable and high-performance malware detection solution.…”
    Get full text
    Article
  10. 750
  11. 751
  12. 752
  13. 753
  14. 754
  15. 755
  16. 756
  17. 757

    Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors by Bandar Alotaibi, Munif Alotaibi

    Published 2025-04-01
    “…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
    Get full text
    Article
  18. 758
  19. 759
  20. 760