Malicious application detection in android—a systematic literature review

T Sharma, D Rattan - Computer Science Review, 2021 - Elsevier
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …

Device to device communication: A survey

MK Pedhadiya, RK Jha, HG Bhatt - Journal of Network and Computer …, 2019 - Elsevier
With the advanced communication technology, the number of users and applications are
increasing exponentially leading towards the scarcity of resources and an increase in power …

Machine learning for DDoS attack detection in industry 4.0 CPPSs

FB Saghezchi, G Mantas, MA Violas… - Electronics, 2022 - mdpi.com
The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-
Physical Production Systems (CPPSs), where man, product, and machine are fully …

Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …

Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android

J Ribeiro, FB Saghezchi, G Mantas, J Rodriguez… - IEEE …, 2020 - ieeexplore.ieee.org
Previous research efforts on developing an Intrusion Detection and Prevention Systems
(IDPS) for Android mobile devices rely mostly on centralized data collection and processing …

5G device-to-device communication security and multipath routing solutions

A Celik, J Tetzner, K Sinha, J Matta - Applied Network Science, 2019 - Springer
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …

An autonomous host-based intrusion detection system for android mobile devices

J Ribeiro, FB Saghezchi, G Mantas, J Rodriguez… - Mobile Networks and …, 2020 - Springer
Abstract Intrusion Detection System (IDS) is crucial to protect smartphones from imminent
security breaches and ensure user privacy. Android is the most popular mobile Operating …

Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image

L Shen, J Feng, Z Chen, Z Sun, D Liang, H Li… - Applied Intelligence, 2023 - Springer
To accurately find malware in a large number of mobile APPs, and determine which family it
belongs to is one of the most important challenges in Android malware detection. Existed …

A systematic review of bring your own device (BYOD) authentication technique

F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …

Towards an autonomous host-based intrusion detection system for android mobile devices

J Ribeiro, G Mantas, FB Saghezchi, J Rodriguez… - … , Networks, and Systems …, 2019 - Springer
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will
provide a wide range of appealing features to enable users to access a rich set of high …