Privacy issues of android application permissions: A literature review
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …
software framework, and core programs. This platform uses permissions to hide precious …
Detection of DDoS attacks in D2D communications using machine learning approach
In device-to-device (D2D) communications, distributed Denial-of-Service (DDoS) attacks can
be quite detrimental because it can result in network structure destruction. Towards this end …
be quite detrimental because it can result in network structure destruction. Towards this end …
How physicality enables trust: A new era of trust-centered cyberphysical systems
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …
security. The unique characteristics of these systems prompt a reevaluation of their security …
Towards a systematic description of the field using bibliometric analysis: malware evolution
SRT Mat, MF Ab Razak, MNM Kahar, JM Arif… - Scientometrics, 2021 - Springer
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are
purposely created to harm computers, mobile devices, or computer networks. Malware …
purposely created to harm computers, mobile devices, or computer networks. Malware …
Air-fi: Leaking data from air-gapped computers using wi-fi frequencies
M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …
Towards privacy risk analysis in android applications using machine learning approaches
K Sharma, BB Gupta - Research Anthology on Securing Mobile …, 2021 - igi-global.com
Android-based devices easily fall prey to an attack due to its free availability in the android
market. These Android applications are not certified by the legitimate organization. If the …
market. These Android applications are not certified by the legitimate organization. If the …
Group key agreement protocol based on privacy protection and attribute authentication
Z Qikun, L Yongjiao, G Yong, Z Chuanyang… - IEEE …, 2019 - ieeexplore.ieee.org
Group key agreement is a good way to ensure secure communication within a group.
However, the identity authentication, privacy protection, and information sharing access …
However, the identity authentication, privacy protection, and information sharing access …
Data leakage detection in Wi-Fi networks
Most users secure their phones from physical access, but other security practices are mostly
poor. Smartphones contain a significant amount of personal data. Additionally, they are …
poor. Smartphones contain a significant amount of personal data. Additionally, they are …
Designing an ensemble of classifiers for smartphone-based indoor localization irrespective of device configuration
P Roy, C Chowdhury - Multimedia Tools and Applications, 2021 - Springer
WiFi-based indoor localization is a popular approach as most buildings and campuses are
WiFi-enabled and its fingerprints are captured by smartphones carried by every individual …
WiFi-enabled and its fingerprints are captured by smartphones carried by every individual …
A risk-driven model to minimize the effects of human factors on smart devices
Human errors exploitation could entail unfavorable consequences to smart device users.
Typically, smart devices provide multiple configurable features, eg, user authentication …
Typically, smart devices provide multiple configurable features, eg, user authentication …