Mobile botnet detection: a comprehensive survey
The number of people using mobile devices is increasing as mobile devices offer different
features and services. Many mobile users install various applications on their mobile …
features and services. Many mobile users install various applications on their mobile …
Classification of cyber security threats on mobile devices and applications
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
A botnets circumspection: The current threat landscape, and what we know so far
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …
impact of their operations. The botnet threat continues to evolve and adapt to …
The impact of DoS attacks on the AR. Drone 2.0
G Vasconcelos, G Carrijo, R Miani… - 2016 XIII Latin …, 2016 - ieeexplore.ieee.org
A key challenge for the use of unmanned aerial vehicles (UAVs) is the security of their
information during navigation to accomplish its task. Information security is a known issue …
information during navigation to accomplish its task. Information security is a known issue …
A root privilege management scheme with revocable authorization for Android devices
Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
[PDF][PDF] Investigating Cyberbullying on WhatsApp Using Digital Forensics Research Workshop
I Riadi, P Widiandana - Jurnal RESTI (Rekayasa Sistem Dan …, 2020 - jurnal.iaii.or.id
Cyberbullying in group conversations in one of the instant messaging applications is one of
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …
the conflicts that occur due to social media, specifically WhatsApp. This study conducted …
[PDF][PDF] Optimization based classification technique for intrusion detection system
V Upendran, R Gopinath - International Journal of Advanced …, 2020 - researchgate.net
The protection of computer networks was assumed by intruder detection systems (IDS). They
detect various forms of attacks and malicious software that are not identifiable by firewalls …
detect various forms of attacks and malicious software that are not identifiable by firewalls …
[PDF][PDF] Evaluation of dos attacks on commercial wi-fi-based uavs
G Vasconcelos, RS Miani, VC Guizilini… - International Journal of …, 2019 - researchgate.net
Aerial Vehicles (UAVs) in large-scale real-world applications is security. However, most of
research projects related to robotics does not discuss security issues, moving on directly to …
research projects related to robotics does not discuss security issues, moving on directly to …