Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (5)
  • Open Access

    REVIEW

    Static Analysis Techniques for Secure Software: A Systematic Review

    Brian Mweu1,*, John Ndia2

    Journal of Cyber Security, Vol.7, pp. 417-437, 2025, DOI:10.32604/jcs.2025.071765 - 10 October 2025

    Abstract Static analysis methods are crucial in developing secure software, as they allow for the early identification of vulnerabilities before the software is executed. This systematic review follows Preferred Reporting Items for Systematic Reviews and Meta-Analyses (PRISMA) 2020 guidelines to assess static analysis techniques for software security enhancement. We systematically searched IEEE Xplore, Association for Computing Machinery (ACM) Digital Library, SpringerLink, and ScienceDirect for journal articles published between 2017 and 2025. The review examines hybrid analyses and machine learning integration to enhance vulnerability detection accuracy. Static analysis tools enable early fault detection but face persistent challenges. More >

  • Open Access

    ARTICLE

    SL-COA: Hybrid Efficient and Enhanced Coati Optimization Algorithm for Structural Reliability Analysis

    Yunhan Ling1, Huajun Peng2, Yiqing Shi1,*, Chao Xu1, Jingzhen Yan1, Jingjing Wang1, Hui Ma3,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.143, No.1, pp. 767-808, 2025, DOI:10.32604/cmes.2025.061763 - 11 April 2025

    Abstract The traditional first-order reliability method (FORM) often encounters challenges with non-convergence of results or excessive calculation when analyzing complex engineering problems. To improve the global convergence speed of structural reliability analysis, an improved coati optimization algorithm (COA) is proposed in this paper. In this study, the social learning strategy is used to improve the coati optimization algorithm (SL-COA), which improves the convergence speed and robustness of the new heuristic optimization algorithm. Then, the SL-COA is compared with the latest heuristic optimization algorithms such as the original COA, whale optimization algorithm (WOA), and osprey optimization algorithm… More >

  • Open Access

    ARTICLE

    Covalent Bond Based Android Malware Detection Using Permission and System Call Pairs

    Rahul Gupta1, Kapil Sharma1,*, R. K. Garg2

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4283-4301, 2024, DOI:10.32604/cmc.2024.046890 - 26 March 2024

    Abstract The prevalence of smartphones is deeply embedded in modern society, impacting various aspects of our lives. Their versatility and functionalities have fundamentally changed how we communicate, work, seek entertainment, and access information. Among the many smartphones available, those operating on the Android platform dominate, being the most widely used type. This widespread adoption of the Android OS has significantly contributed to increased malware attacks targeting the Android ecosystem in recent years. Therefore, there is an urgent need to develop new methods for detecting Android malware. The literature contains numerous works related to Android malware detection.… More >

  • Open Access

    ARTICLE

    Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm

    V. Joseph Raymond1,2,*, R. Jeberson Retna Raj1

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2147-2163, 2023, DOI:10.32604/csse.2023.028227 - 01 August 2022

    Abstract Android devices are popularly available in the commercial market at different price levels for various levels of customers. The Android stack is more vulnerable compared to other platforms because of its open-source nature. There are many android malware detection techniques available to exploit the source code and find associated components during execution time. To obtain a better result we create a hybrid technique merging static and dynamic processes. In this paper, in the first part, we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid… More >

  • Open Access

    ARTICLE

    A Learning Model to Detect Android C&C Applications Using Hybrid Analysis

    Attia Qammar1, Ahmad Karim1,*, Yasser Alharbi2, Mohammad Alsaffar2, Abdullah Alharbi2

    Computer Systems Science and Engineering, Vol.43, No.3, pp. 915-930, 2022, DOI:10.32604/csse.2022.023652 - 09 May 2022

    Abstract Smartphone devices particularly Android devices are in use by billions of people everywhere in the world. Similarly, this increasing rate attracts mobile botnet attacks which is a network of interconnected nodes operated through the command and control (C&C) method to expand malicious activities. At present, mobile botnet attacks launched the Distributed denial of services (DDoS) that causes to steal of sensitive data, remote access, and spam generation, etc. Consequently, various approaches are defined in the literature to detect mobile botnet attacks using static or dynamic analysis. In this paper, a novel hybrid model, the combination More >

Displaying 1-10 on page 1 of 5. Per Page