Privacy issues of android application permissions: A literature review

G Shrivastava, P Kumar, D Gupta… - Transactions on …, 2020 - Wiley Online Library
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …

Detection of DDoS attacks in D2D communications using machine learning approach

SVJ Rani, I Ioannou, P Nagaradjane… - Computer …, 2023 - Elsevier
In device-to-device (D2D) communications, distributed Denial-of-Service (DDoS) attacks can
be quite detrimental because it can result in network structure destruction. Towards this end …

How physicality enables trust: A new era of trust-centered cyberphysical systems

S Gil, M Yemini, A Chorti, A Nedić, HV Poor… - arXiv preprint arXiv …, 2023 - arxiv.org
Multi-agent cyberphysical systems enable new capabilities in efficiency, resilience, and
security. The unique characteristics of these systems prompt a reevaluation of their security …

Towards a systematic description of the field using bibliometric analysis: malware evolution

SRT Mat, MF Ab Razak, MNM Kahar, JM Arif… - Scientometrics, 2021 - Springer
Malware is a blanket term for Trojan, viruses, spyware, worms, and other files that are
purposely created to harm computers, mobile devices, or computer networks. Malware …

Air-fi: Leaking data from air-gapped computers using wi-fi frequencies

M Guri - IEEE Transactions on Dependable and Secure …, 2022 - ieeexplore.ieee.org
This article presents a new attack allowing attackers to exfiltrate data from isolated, air-
gapped computers via Wi-Fi frequencies. We show that malware in a compromised air …

Towards privacy risk analysis in android applications using machine learning approaches

K Sharma, BB Gupta - Research Anthology on Securing Mobile …, 2021 - igi-global.com
Android-based devices easily fall prey to an attack due to its free availability in the android
market. These Android applications are not certified by the legitimate organization. If the …

Group key agreement protocol based on privacy protection and attribute authentication

Z Qikun, L Yongjiao, G Yong, Z Chuanyang… - IEEE …, 2019 - ieeexplore.ieee.org
Group key agreement is a good way to ensure secure communication within a group.
However, the identity authentication, privacy protection, and information sharing access …

Data leakage detection in Wi-Fi networks

P Shrivastava, P Agarwal, K Sharma… - Cyber Crime and …, 2021 - degruyter.com
Most users secure their phones from physical access, but other security practices are mostly
poor. Smartphones contain a significant amount of personal data. Additionally, they are …

Designing an ensemble of classifiers for smartphone-based indoor localization irrespective of device configuration

P Roy, C Chowdhury - Multimedia Tools and Applications, 2021 - Springer
WiFi-based indoor localization is a popular approach as most buildings and campuses are
WiFi-enabled and its fingerprints are captured by smartphones carried by every individual …

A risk-driven model to minimize the effects of human factors on smart devices

S Gupta, A Buriro, B Crispo - International Workshop on Emerging …, 2019 - Springer
Human errors exploitation could entail unfavorable consequences to smart device users.
Typically, smart devices provide multiple configurable features, eg, user authentication …