Ai-driven cybersecurity: an overview, security intelligence modeling and research directions
Artificial intelligence (AI) is one of the key technologies of the Fourth Industrial Revolution (or
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …
Industry 4.0), which can be used for the protection of Internet-connected systems from cyber …
Cybersecurity data science: an overview from machine learning perspective
In a computing context, cybersecurity is undergoing massive shifts in technology and its
operations in recent days, and data science is driving the change. Extracting security …
operations in recent days, and data science is driving the change. Extracting security …
Cyber-physical systems security: Limitations, issues and future trends
Abstract Typically, Cyber-Physical Systems (CPS) involve various interconnected systems,
which can monitor and manipulate real objects and processes. They are closely related to …
which can monitor and manipulate real objects and processes. They are closely related to …
Comparative analysis of Android and iOS from security viewpoint
Smartphone usage has increased exponentially in the recent years. Android and iOS are the
most popular smartphone platforms, while the ease of use along with the computational …
most popular smartphone platforms, while the ease of use along with the computational …
Chex: statically vetting android apps for component hijacking vulnerabilities
An enormous number of apps have been developed for Android in recent years, making it
one of the most popular mobile operating systems. However, the quality of the booming …
one of the most popular mobile operating systems. However, the quality of the booming …
Why Eve and Mallory love Android: An analysis of Android SSL (in) security
Many Android apps have a legitimate need to communicate over the Internet and are then
responsible for protecting potentially sensitive data during transit. This paper seeks to better …
responsible for protecting potentially sensitive data during transit. This paper seeks to better …
PIndroid: A novel Android malware detection system using ensemble learning methods
The extensive use of smartphones has been a major driving force behind a drastic increase
of malware attacks. Covert techniques used by the malware make them hard to detect with …
of malware attacks. Covert techniques used by the malware make them hard to detect with …
Effective {Inter-Component} communication mapping in android: An essential step towards holistic security analysis
Many threats present in smartphones are the result of interactions between application
components, not just artifacts of single components. However, current techniques for …
components, not just artifacts of single components. However, current techniques for …
Demystifying exploitable bugs in smart contracts
Exploitable bugs in smart contracts have caused significant monetary loss. Despite the
substantial advances in smart contract bug finding, exploitable bugs and real-world attacks …
substantial advances in smart contract bug finding, exploitable bugs and real-world attacks …
[PDF][PDF] Systematic detection of capability leaks in stock android smartphones.
Recent years have witnessed a meteoric increase in the adoption of smartphones. To
manage information and features on such phones, Android provides a permission-based …
manage information and features on such phones, Android provides a permission-based …