|
|
|
Norah Abanmi, Heba Kurdi and Mai Alzamel
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma...
ver más
|
|
|
|
|
|
|
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ...
ver más
|
|
|
|
|
|
|
Muawya Naser and Qasem Abu Al-Haija
|
|
|
|
|
|
|
Manish Bhurtel and Danda B. Rawat
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and...
ver más
|
|
|
|
|
|
|
Saw Thiha and Jay Rajasekera
The rapid expansion of video conferencing and remote works due to the COVID-19 pandemic has resulted in a massive volume of video data to be analyzed in order to understand the audience engagement. However, analyzing this data efficiently, particularly i...
ver más
|
|
|
|
|
|
|
Tabassum Kanwal, Saif Ur Rehman, Tariq Ali, Khalid Mahmood, Santos Gracia Villar, Luis Alonso Dzul Lopez and Imran Ashraf
Agriculture is a critical domain, where technology can have a significant impact on increasing yields, improving crop quality, and reducing environmental impact. The use of renewable energy sources such as solar power in agriculture has gained momentum i...
ver más
|
|
|
|
|
|
|
Yann Stephen Mandza and Atanda Raji
In developing countries today, population growth and the penetration of higher standard of living appliances in homes has resulted in a rapidly increasing residential load. In South Africa, the recent rolling blackouts and electricity price increase only...
ver más
|
|
|
|
|
|
|
Emmanouil Krasanakis and Andreas Symeonidis
To help developers discover libraries suited to their software projects, automated approaches often start from already employed libraries and recommend more based on co-occurrence patterns in other projects. The most accurate project?library recommendati...
ver más
|
|
|
|
|
|
|
Sarah Alhejji, Abdulmohsen Albesher, Heider Wahsheh and Abdulaziz Albarrak
In many countries, the rapid growth of the Internet and mobile technologies has led to the expansion of Internet banking, especially mobile banking. Many banks seek to provide integrated banking services through mobile applications (apps) to increase cus...
ver más
|
|
|
|
|
|
|
Antonio Francesco Gentile, Davide Macrì, Floriano De Rango, Mauro Tropea and Emilio Greco
Virtual private network (VPN) represents an HW/SW infrastructure that implements private and confidential communication channels that usually travel through the Internet. VPN is currently one of the most reliable technologies to achieve this goal, also b...
ver más
|
|
|
|