Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Classification of cyber security threats on mobile devices and applications
MA Almaiah, A Al-Zahrani, O Almomani… - Artificial Intelligence and …, 2021 - Springer
Mobile devices and applications are prone to different kinds of cyber threats and attacks that
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
affect their users' privacy. Therefore, there is critical need to understand all cyber threats …
Mobile botnet detection: a comprehensive survey
S Hamzenejadi, M Ghazvini, S Hosseini - International Journal of …, 2023 - Springer
The number of people using mobile devices is increasing as mobile devices offer different
features and services. Many mobile users install various applications on their mobile …
features and services. Many mobile users install various applications on their mobile …
[HTML][HTML] SlowITe, a novel denial of service attack affecting MQTT
I Vaccari, M Aiello, E Cambiaso - Sensors, 2020 - mdpi.com
Security of the Internet of Things is a crucial topic, due to the criticality of the networks and
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
the sensitivity of exchanged data. In this paper, we target the Message Queue Telemetry …
[HTML][HTML] A botnets circumspection: The current threat landscape, and what we know so far
EC Ogu, OA Ojesanmi, O Awodele, S Kuyoro - Information, 2019 - mdpi.com
Botnets have carved a niche in contemporary networking and cybersecurity due to the
impact of their operations. The botnet threat continues to evolve and adapt to …
impact of their operations. The botnet threat continues to evolve and adapt to …
The impact of DoS attacks on the AR. Drone 2.0
G Vasconcelos, G Carrijo, R Miani… - 2016 XIII Latin …, 2016 - ieeexplore.ieee.org
A key challenge for the use of unmanned aerial vehicles (UAVs) is the security of their
information during navigation to accomplish its task. Information security is a known issue …
information during navigation to accomplish its task. Information security is a known issue …
A root privilege management scheme with revocable authorization for Android devices
Y Tan, Y Xue, C Liang, J Zheng, Q Zhang… - Journal of Network and …, 2018 - Elsevier
As a critical part in mobile cloud computing, the vulnerability of Android devices can directly
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
affect the security of the mobile cloud. The unsecured Android can be potentially exploited …
[HTML][HTML] Slowtt: A slow denial of service against iot networks
I Vaccari, M Aiello, E Cambiaso - Information, 2020 - mdpi.com
The security of Internet of Things environments is a critical and trending topic, due to the
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
nature of the networks and the sensitivity of the exchanged information. In this paper, we …
[PDF][PDF] Evaluation of dos attacks on commercial wi-fi-based uavs
G Vasconcelos, RS Miani, VC Guizilini… - International Journal of …, 2019 - researchgate.net
Aerial Vehicles (UAVs) in large-scale real-world applications is security. However, most of
research projects related to robotics does not discuss security issues, moving on directly to …
research projects related to robotics does not discuss security issues, moving on directly to …
[PDF][PDF] Optimization based classification technique for intrusion detection system
V Upendran, R Gopinath - International Journal of Advanced …, 2020 - researchgate.net
The protection of computer networks was assumed by intruder detection systems (IDS). They
detect various forms of attacks and malicious software that are not identifiable by firewalls …
detect various forms of attacks and malicious software that are not identifiable by firewalls …
[PDF][PDF] Evaluating the impact of feature selection methods on the performance of the machine learning models in detecting DDoS attacks
N Bindra, M Sood - Rom. J. Inf. Sci. Technol, 2020 - romjist.ro
Heaps of Data lie in network equipment of the organizations. To break down this information
and reach some significant inferences is inconceivable for the present day IDS (Intrusion …
and reach some significant inferences is inconceivable for the present day IDS (Intrusion …