Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review

T Al lelah, G Theodorakopoulos, P Reinecke… - … of Cybersecurity and …, 2023 - mdpi.com
The widespread adoption of cloud-based and public legitimate services (CPLS) has
inadvertently opened up new avenues for cyber attackers to establish covert and resilient …

[PDF][PDF] Mobile malware detection: A survey

YSI Hamed, SNA AbdulKader… - International Journal of …, 2019 - academia.edu
The innovation and growth in the usability of mobile phones is astonishing. There is the
nightmare of getting a malware program through many applications and games available on …

Using firebase cloud messaging to control mobile applications

MA Mokar, SO Fageeri, SE Fattoh - … Conference on Computer …, 2019 - ieeexplore.ieee.org
The system proposed in this paper is new framework that can be utilized by any application
programmer to use it for control mobile Application by using FCM technology Stand for …

Dapanda: Detecting aggressive push notifications in android apps

T Liu, H Wang, L Li, G Bai, Y Guo… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Mobile push notifications have been widely used in mobile platforms to deliver all sorts of
information to app users. Although it offers great convenience for both app developers and …

On the characterization and risk assessment of ai-powered mobile cloud applications

H Elahi, G Wang, Y Xu, A Castiglione, Q Yan… - Computer Standards & …, 2021 - Elsevier
Ultra-reliable low-latency communication supports powerful mission-critical applications
such as artificial intelligence-enabled mobile cloud applications designed to deliver the …

The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services

N Samarin, A Sanchez, T Chung… - arXiv preprint arXiv …, 2024 - arxiv.org
Like most modern software, secure messaging apps rely on third-party components to
implement important app functionality. Although this practice reduces engineering costs, it …

An Empirical Study on Detection of Android Adware Using Machine Learning Techniques

U Farooq, SS Khurana, P Singh, M Kumar - Multimedia Tools and …, 2024 - Springer
The Android operating system, without showing signs of diminishing, has experienced
unprecedented popularity and continues to thrive with a significant user base. Its notable …

Cloud message queueing and notification: challenges and opportunities

C Esposito, F Palmieri, KKR Choo - IEEE Cloud Computing, 2018 - ieeexplore.ieee.org
The current mobile app development practice, like other large-scale network-centric
software projects, is characterized by the use of event notification facilities supporting the …

Pengembangan Aplikasi Penerimaan Mahasiswa Baru Berbasis Android Dilengkapi dengan Fitur Push Notification

EN Jannah, DK Bayturrohman… - Jurnal Nasional Teknik …, 2017 - journal.ugm.ac.id
Student Admission is an annual compulsory activity which is always conducted by
universities, both state university and private university. Student admission information is …

Intelliav: Toward the feasibility of building intelligent anti-malware on android devices

M Ahmadi, A Sotgiu, G Giacinto - … and Knowledge Extraction: First IFIP TC …, 2017 - Springer
Android is targeted the most by malware coders as the number of Android users is
increasing. Although there are many Android anti-malware solutions available in the market …