NUK - logo

Rezultati iskanja

Osnovno iskanje    Ukazno iskanje   

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 1.275
1.
  • MLDroid—framework for Andro... MLDroid—framework for Android malware detection using machine learning techniques
    Mahindru, Arvind; Sangal, A. L. Neural computing & applications, 05/2021, Letnik: 33, Številka: 10
    Journal Article
    Recenzirano

    This research paper presents MLDroid—a web-based framework—which helps to detect malware from Android devices. Due to increase in the popularity of Android devices, malware developers develop malware ...
Celotno besedilo
2.
  • FSDroid:- A feature selecti... FSDroid:- A feature selection technique to detect malware from Android using Machine Learning Techniques
    Mahindru, Arvind; Sangal, A.L. Multimedia tools and applications, 2021/4, Letnik: 80, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    With the recognition of free apps, Android has become the most widely used smartphone operating system these days and it naturally invited cyber-criminals to build malware-infected apps that can ...
Celotno besedilo

PDF
3.
  • SemiDroid: a behavioral mal... SemiDroid: a behavioral malware detector based on unsupervised machine learning techniques using feature selection approaches
    Mahindru, Arvind; Sangal, A. L. International journal of machine learning and cybernetics, 05/2021, Letnik: 12, Številka: 5
    Journal Article
    Recenzirano

    With the exponential growth in Android apps, Android based devices are becoming victims of target attackers in the “silent battle” of cybernetics. To protect Android based devices from malware has ...
Celotno besedilo
4.
  • HybriDroid: an empirical an... HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods
    Mahindru, Arvind; Sangal, A. L. The Journal of supercomputing, 08/2021, Letnik: 77, Številka: 8
    Journal Article
    Recenzirano

    Malware detection from the smartphone has become a challenging issue for academicians and researchers. In this research paper, we applied five distinct machine learning algorithms and three different ...
Celotno besedilo
5.
  • SelTCS: a framework for sel... SelTCS: a framework for selecting trustworthy cloud services
    Thakur, Neha; Singh, Avtar; Sangal, A L Sadhana (Bangalore), 05/2023, Letnik: 48, Številka: 2
    Journal Article
    Recenzirano

    Cloud computing is a computer science paradigm that has grown significantly in recent years. It provides on-demand access to a diverse set of software, infrastructure and platform services through ...
Celotno besedilo
6.
  • SOMDROID: android malware d... SOMDROID: android malware detection by artificial neural network trained using unsupervised learning
    Mahindru, Arvind; Sangal, A. L. Evolutionary intelligence, 03/2022, Letnik: 15, Številka: 1
    Journal Article
    Recenzirano

    Android has gained its popularity due to its open-source and number of freely available apps in its official play store. Appropriate functioning of Android apps depends upon the permission or set of ...
Celotno besedilo
7.
  • HMOSHSSA: a hybrid meta-heu... HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems
    Kaur, Satnam; Awasthi, Lalit K.; Sangal, A. L. Engineering with computers, 10/2021, Letnik: 37, Številka: 4
    Journal Article
    Recenzirano

    This paper proposes a novel hybrid multi-objective optimization algorithm named HMOSHSSA by synthesizing the strengths of Multi-objective Spotted Hyena Optimizer (MOSHO) and Salp Swarm Algorithm ...
Celotno besedilo
8.
  • A Brief Review on Multi-obj... A Brief Review on Multi-objective Software Refactoring and a New Method for Its Recommendation
    Kaur, Satnam; Awasthi, Lalit K.; Sangal, A. L. Archives of computational methods in engineering, 06/2021, Letnik: 28, Številka: 4
    Journal Article
    Recenzirano

    Software refactoring is a commonly accepted means of improving the software quality without affecting its observable behaviour. It has gained significant attention from both academia and software ...
Celotno besedilo
9.
  • Building a hierarchical str... Building a hierarchical structure model of enablers that affect the software process improvement in software SMEs—A mixed method approach
    Sharma, Pooja; Sangal, A.L. Computer standards and interfaces, 10/2019, Letnik: 66
    Journal Article
    Recenzirano

    •RQ1: What are the various indicators for successful SPI in software SMEs? Can these indicators be grouped under various categories, so-called enablers?•RQ2: What is the hierarchical association ...
Celotno besedilo
10.
  • An anomaly based distribute... An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks
    Bhandari, Abhinav; Kumar, Krishan; Sangal, A. L. ... Journal of ambient intelligence and humanized computing, 2021/1, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano

    In the present computer era, the vulnerabilities inherent in the Internet architecture enable various kinds of attacks. Distributed Denial of Service (DDoS) is one of such prominent attack that is a ...
Celotno besedilo
1 2 3 4 5
zadetkov: 1.275

Nalaganje filtrov