Classification of cyber security threats on mobile devices and applications

MA Almaiah, A Al-Zahrani, O Almomani… - Artificial Intelligence and …, 2021‏ - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …

Mobile botnet detection: a comprehensive survey

S Hamzenejadi, M Ghazvini, S Hosseini - International Journal of …, 2023‏ - Springer
The number of people using mobile devices is increasing as mobile devices offer different
features and services. Many mobile users install various applications on their mobile …

[HTML][HTML] SlowITe, a novel denial of service attack affecting MQTT

I Vaccari, M Aiello, E Cambiaso - Sensors, 2020‏ - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …

[HTML][HTML] A botnets circumspection: The current threat landscape, and what we know so far

EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019‏ - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …

The impact of DoS attacks on the AR. Drone 2.0

G Vasconcelos, G Carrijo, R Miani… - 2016 XIII Latin …, 2016‏ - ieeexplore.ieee.org
A key challenge for the use of unmanned aerial vehicles (UAVs) is the security of their
information during navigation to accomplish its task. Information security is a known issue …

A root privilege management scheme with revocable authorization for Android devices

Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018‏ - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …

[HTML][HTML] Slowtt: A slow denial of service against iot networks

I Vaccari, M Aiello, E Cambiaso - Information, 2020‏ - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …

[PDF][PDF] Evaluation of dos attacks on commercial wi-fi-based uavs

G Vasconcelos, RS Miani, VC Guizilini… - International Journal of …, 2019‏ - researchgate.net
Aerial Vehicles (UAVs) in large-scale real-world applications is security. However, most of
research projects related to robotics does not discuss security issues, moving on directly to …

[PDF][PDF] Optimization based classification technique for intrusion detection system

V Upendran, R Gopinath - International Journal of Advanced …, 2020‏ - researchgate.net
The protection of computer networks was assumed by intruder detection systems (IDS). They
detect various forms of attacks and malicious software that are not identifiable by firewalls …

[PDF][PDF] Evaluating the impact of feature selection methods on the performance of the machine learning models in detecting DDoS attacks

N Bindra, M Sood - Rom. J. Inf. Sci. Technol, 2020‏ - romjist.ro
Heaps of Data lie in network equipment of the organizations. To break down this information
and reach some significant inferences is inconceivable for the present day IDS (Intrusion …