Malicious traffic analysis on mobile devices: a hardware solution

M Barbareschi, A Mazzeo… - International Journal of …, 2015 - inderscienceonline.com
The security of smartphone devices is increasingly jeopardised by viruses, intrusion
attempts and trojans, which most of them come from the internet traffic. Since the involved …

Network traffic analysis using android on a hybrid computing architecture

M Barbareschi, A Mazzeo, A Vespoli - International Conference on …, 2013 - Springer
Nowadays more and more smartphone applications use internet connection, resulting, from
the analysis point of view, in complex and huge generated traffic. Due to mobility and …

Knot automata

LH Kauffman - Proceedings of 24th International Symposium on …, 1994 - ieeexplore.ieee.org
This paper studies a mathematical model for automata as direct abstractions of digital
circuitry. We give a rigorous model for distributed delays in terms of a precedence order of …

[PDF][PDF] Providing Mobile Traffic Analysis as-a-Service: design of a service-based infrastructure to offer high-accuracy traffic classifiers based on hardware accelerators.

M Barbareschi, A De Benedictis, A Mazzeo… - Journal of Digital …, 2015 - dline.info
Mobile traffic is significantly growing, thanks to the increased access capacity provided by
3G and 4G technologies and to the rising computing power of the latest smart devices. Due …

Towards hierarchical security framework for smartphones

H Luo, G He, X Lin, X Shen - 2012 1st IEEE International …, 2012 - ieeexplore.ieee.org
With powerful computing capability, plentiful functionality and advanced operating systems
with flexible APIs, smartphones have become indispensable part of our daily lives. However …

Mobile traffic analysis exploiting a cloud infrastructure and hardware accelerators

M Barbareschi, A De Benedictis… - … Conference on P2P …, 2014 - ieeexplore.ieee.org
Recently, traffic analysis and measurements have been used to characterize, from a security
point of view, applications' and network behavior to avoid intrusion attempts, malware …

IoT-HASS: A Framework for Protecting Smart Home Environment

T Mudawi - 2020 - scholar.dsu.edu
While many solutions have been proposed for smart home security, the problem that no
single solution fully protects the smart home environment still exists. In this research we …

Smartphone nabbing: analysis of intrusion detection and prevention systems

S Vij, A Jain - 2016 3rd International Conference on Computing …, 2016 - ieeexplore.ieee.org
In the past few years, the usage of Smartphones has increased at exponential rates. The
pace of change in the smartphone market is astounding with the advent of new technologies …

Securing the Digital Perimeter Intrusion Detection for Robust Data Protection in Cybersecurity

WF Faris, RR Mirajkar - Research Journal of Computer …, 2023 - technicaljournals.org
In cybersecurity, protecting the digital boundaries is very important to avoid data leaks and
illegal access. In order to keep data safe, intrusion detection systems (IDS) are very …

A flow marking based anti-spoofing Mechanism (FMAS) using SDN approach

S Ahmed, N Medhi - Progress in Advanced Computing and Intelligent …, 2018 - Springer
Security has become a potential issue among the Internet users all over the globe. IP
spoofing is one of the major security threats to the Internet. Spoofing is a technique in which …