Malicious application detection in android—a systematic literature review
Context: In last decade, due to tremendous usage of smart phones it seems that these
gadgets became an essential necessity of day-to-day life. People are using new …
gadgets became an essential necessity of day-to-day life. People are using new …
Device to device communication: A survey
With the advanced communication technology, the number of users and applications are
increasing exponentially leading towards the scarcity of resources and an increase in power …
increasing exponentially leading towards the scarcity of resources and an increase in power …
Machine learning for DDoS attack detection in industry 4.0 CPPSs
The Fourth Industrial Revolution (Industry 4.0) has transformed factories into smart Cyber-
Physical Production Systems (CPPSs), where man, product, and machine are fully …
Physical Production Systems (CPPSs), where man, product, and machine are fully …
Applications in security and evasions in machine learning: a survey
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …
privacy in various applications. ML is used to address serious issues such as real-time …
Hidroid: prototy** a behavioral host-based intrusion detection and prevention system for android
Previous research efforts on develo** an Intrusion Detection and Prevention Systems
(IDPS) for Android mobile devices rely mostly on centralized data collection and processing …
(IDPS) for Android mobile devices rely mostly on centralized data collection and processing …
An autonomous host-based intrusion detection system for android mobile devices
Abstract Intrusion Detection System (IDS) is crucial to protect smartphones from imminent
security breaches and ensure user privacy. Android is the most popular mobile Operating …
security breaches and ensure user privacy. Android is the most popular mobile Operating …
Rule-based with Machine learning IDS for DDoS attack detection in cyber-physical production systems (CPPS)
Recent advancements in communication technology have transformed the way the industrial
system works. This digitalization has improved the way of communication between different …
system works. This digitalization has improved the way of communication between different …
5G device-to-device communication security and multipath routing solutions
Through direct communication, device-to-device (D2D) technology can increase the overall
throughput, enhance the coverage, and reduce the power consumption of cellular …
throughput, enhance the coverage, and reduce the power consumption of cellular …
Self-attention based convolutional-LSTM for android malware detection using network traffics grayscale image
L Shen, J Feng, Z Chen, Z Sun, D Liang, H Li… - Applied Intelligence, 2023 - Springer
To accurately find malware in a large number of mobile APPs, and determine which family it
belongs to is one of the most important challenges in Android malware detection. Existed …
belongs to is one of the most important challenges in Android malware detection. Existed …
A systematic review of bring your own device (BYOD) authentication technique
F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …
technique. The review main goal is to identify the existing BYOD authentication technique …