Mobile botnet detection: a comprehensive survey

S Hamzenejadi, M Ghazvini, S Hosseini - International Journal of …, 2023 - Springer
The number of people using mobile devices is increasing as mobile devices offer different
features and services. Many mobile users install various applications on their mobile …

Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

SlowITe, a novel denial of service attack affecting MQTT

I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …

A botnets circumspection: The current threat landscape, and what we know so far

EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019 - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …

The impact of DoS attacks on the AR. Drone 2.0

G Vasconcelos, G Carrijo, R Miani… - 2016 XIII Latin …, 2016 - ieeexplore.ieee.org
A key challenge for the use of unmanned aerial vehicles (UAVs) is the security of their
information during navigation to accomplish its task. Information security is a known issue …

A root privilege management scheme with revocable authorization for Android devices

Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …

Slowtt: A slow denial of service against iot networks

I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …

[PDF][PDF] Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop

I Riadi, P Widiandana - Jurnal RESTI (Rekayasa Sistem Dan …, 2020 - jurnal.iaii.or.id
Cyberbullying in group conversations in one of the instant messaging applications is one of
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …

[PDF][PDF] Optimization based classification technique for intrusion detection system

V Upendran, R Gopinath - International Journal of Advanced …, 2020 - researchgate.net
The protection of computer networks was assumed by intruder detection systems (IDS). They
detect various forms of attacks and malicious software that are not identifiable by firewalls …

[PDF][PDF] Evaluation of dos attacks on commercial wi-fi-based uavs

G Vasconcelos, RS Miani, VC Guizilini… - International Journal of …, 2019 - researchgate.net
Aerial Vehicles (UAVs) in large-scale real-world applications is security. However, most of
research projects related to robotics does not discuss security issues, moving on directly to …