A survey on various threats and current state of security in android platform
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …
the masses. The latest technologies have made it affordable for every section of the society …
A survey of security vulnerability analysis, discovery, detection, and mitigation on IoT devices
M Yu, J Zhuge, M Cao, Z Shi, L Jiang - Future Internet, 2020 - mdpi.com
With the prosperity of the Internet of Things (IoT) industry environment, the variety and
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
quantity of IoT devices have grown rapidly. IoT devices have been widely used in smart …
Context aware dynamic permission model: a retrospect of privacy and security in android system
Android security has been a topic of concern lately in both academic and industrial research
because of various occurrence of privacy leaks and security breach on these devices. The …
because of various occurrence of privacy leaks and security breach on these devices. The …
[PDF][PDF] Instaguard: Instantly deployable hot-patches for vulnerable system programs on android
Hot-patches, easier to develop and faster to deploy than permanent patches, are used to
timely (and temporarily) block exploits of newly discovered vulnerabilities while permanent …
timely (and temporarily) block exploits of newly discovered vulnerabilities while permanent …
Cybersecurity: A survey of vulnerability analysis and attack graphs
R Ait Maalem Lahcen, R Mohapatra… - … and Computing: ICMC …, 2018 - Springer
The network infrastructure is the most critical technical asset of any organization. This
network architecture must be useful, efficient, and secure. However, their cybersecurity …
network architecture must be useful, efficient, and secure. However, their cybersecurity …
Identifying and evading android sandbox through usage-profile based fingerprints
V Costamagna, C Zheng, H Huang - … of the first workshop on radical and …, 2018 - dl.acm.org
Android sandbox is built either on the Android emulator or the real device with a hooking
framework. Fingerprints of the Android sandbox could be used to evade the dynamic …
framework. Fingerprints of the Android sandbox could be used to evade the dynamic …
Toward smarter vulnerability discovery using machine learning
G Grieco, A Dinaburg - Proceedings of the 11th ACM Workshop on …, 2018 - dl.acm.org
A Cyber Reasoning System (CRS) is designed to automatically find and exploit software
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …
vulnerabilities in complex software. To be effective, CRSs integrate multiple vulnerability …
A taxonomy on recent mobile malware: Features, analysis methods, and detection techniques
H Alimardani, M Nazeh - … of the 2018 International Conference on E …, 2018 - dl.acm.org
Smartphones, tablets, and other mobile devices have quickly become ubiquitous due to their
highly personal and powerful attributes. Android has been the most popular mobile …
highly personal and powerful attributes. Android has been the most popular mobile …
[PDF][PDF] 人工智能对工业4.0 关键技术引领探讨
陈巍 - 现代工业经济和信息化, 2018 - researchgate.net
人工智能对工业4.0 关键技术引领探讨 Page 1 DOI:10.16525/j.cnki.14- 1362/n.2018.02.02 总第
158 期 2018 年第2 期 Total of 158 No.2,2018 理论研究 收稿日期:2018- 01- 15 作者简介:陈巍 …
158 期 2018 年第2 期 Total of 158 No.2,2018 理论研究 收稿日期:2018- 01- 15 作者简介:陈巍 …
[PDF][PDF] W-shield: protection against cryptocurrency wallet credential stealing
A Nakamoto - Workshop on Security and Privacy in E-Commerce, 2018 - researchgate.net
The birth of Bitcoin (1) is considered as a radical development in money and currency, being
the first example of a decentralized digital asset which simultaneously has no backing or …
the first example of a decentralized digital asset which simultaneously has no backing or …