Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
Device to device communication: A survey
MK Pedhadiya, RK Jha, HG Bhatt - Journal of Network and Computer …, 2019 - Elsevier
With the advanced communication technology, the number of users and applications are
increasing exponentially leading towards the scarcity of resources and an increase in power …
increasing exponentially leading towards the scarcity of resources and an increase in power …
Machine learning for DDoS attack detection in industry 4.0 CPPSs
The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-
Physical Production Systems (CPPSs), where man, product, and machine are fully …
Physical Production Systems (CPPSs), where man, product, and machine are fully …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
Hidroid: prototyping a behavioral host-based intrusion detection and prevention system for android
Previous research efforts on developing an Intrusion Detection and Prevention Systems
(IDPS) for Android mobile devices rely mostly on centralized data collection and processing …
(IDPS) for Android mobile devices rely mostly on centralized data collection and processing …
5G device-to-device communication security and multipath routing solutions
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …
throughput, enhance the coverage, and reduce the power consumption of cellular …
An autonomous host-based intrusion detection system for android mobile devices
Abstract Intrusion Detection System (IDS) is crucial to protect smartphones from imminent
security breaches and ensure user privacy. Android is the most popular mobile Operating …
security breaches and ensure user privacy. Android is the most popular mobile Operating …
Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image
L Shen, J Feng, Z Chen, Z Sun, D Liang, H Li… - Applied Intelligence, 2023 - Springer
To accurately find malware in a large number of mobile APPs, and determine which family it
belongs to is one of the most important challenges in Android malware detection. Existed …
belongs to is one of the most important challenges in Android malware detection. Existed …
A systematic review of bring your own device (BYOD) authentication technique
F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …
technique. The review main goal is to identify the existing BYOD authentication technique …
Towards an autonomous host-based intrusion detection system for android mobile devices
In the 5G era, mobile devices are expected to play a pivotal role in our daily life. They will
provide a wide range of appealing features to enable users to access a rich set of high …
provide a wide range of appealing features to enable users to access a rich set of high …