Abuse of cloud-based and public legitimate services as command-and-control (C&C) infrastructure: a systematic literature review
T Al lelah, G Theodorakopoulos, P Reinecke… - … of Cybersecurity and …, 2023 - mdpi.com
The widespread adoption of cloud-based and public legitimate services (CPLS) has
inadvertently opened up new avenues for cyber attackers to establish covert and resilient …
inadvertently opened up new avenues for cyber attackers to establish covert and resilient …
[PDF][PDF] Mobile malware detection: A survey
YSI Hamed, SNA AbdulKader… - International Journal of …, 2019 - academia.edu
The innovation and growth in the usability of mobile phones is astonishing. There is the
nightmare of getting a malware program through many applications and games available on …
nightmare of getting a malware program through many applications and games available on …
Using firebase cloud messaging to control mobile applications
MA Mokar, SO Fageeri, SE Fattoh - … Conference on Computer …, 2019 - ieeexplore.ieee.org
The system proposed in this paper is new framework that can be utilized by any application
programmer to use it for control mobile Application by using FCM technology Stand for …
programmer to use it for control mobile Application by using FCM technology Stand for …
Dapanda: Detecting aggressive push notifications in android apps
Mobile push notifications have been widely used in mobile platforms to deliver all sorts of
information to app users. Although it offers great convenience for both app developers and …
information to app users. Although it offers great convenience for both app developers and …
On the characterization and risk assessment of ai-powered mobile cloud applications
Ultra-reliable low-latency communication supports powerful mission-critical applications
such as artificial intelligence-enabled mobile cloud applications designed to deliver the …
such as artificial intelligence-enabled mobile cloud applications designed to deliver the …
The Medium is the Message: How Secure Messaging Apps Leak Sensitive Data to Push Notification Services
Like most modern software, secure messaging apps rely on third-party components to
implement important app functionality. Although this practice reduces engineering costs, it …
implement important app functionality. Although this practice reduces engineering costs, it …
An Empirical Study on Detection of Android Adware Using Machine Learning Techniques
The Android operating system, without showing signs of diminishing, has experienced
unprecedented popularity and continues to thrive with a significant user base. Its notable …
unprecedented popularity and continues to thrive with a significant user base. Its notable …
Cloud message queueing and notification: challenges and opportunities
C Esposito, F Palmieri, KKR Choo - IEEE Cloud Computing, 2018 - ieeexplore.ieee.org
The current mobile app development practice, like other large-scale network-centric
software projects, is characterized by the use of event notification facilities supporting the …
software projects, is characterized by the use of event notification facilities supporting the …
Pengembangan Aplikasi Penerimaan Mahasiswa Baru Berbasis Android Dilengkapi dengan Fitur Push Notification
EN Jannah, DK Bayturrohman… - Jurnal Nasional Teknik …, 2017 - journal.ugm.ac.id
Student Admission is an annual compulsory activity which is always conducted by
universities, both state university and private university. Student admission information is …
universities, both state university and private university. Student admission information is …
Intelliav: Toward the feasibility of building intelligent anti-malware on android devices
Android is targeted the most by malware coders as the number of Android users is
increasing. Although there are many Android anti-malware solutions available in the market …
increasing. Although there are many Android anti-malware solutions available in the market …