Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
Modeling and analysis of RRC-based signalling storms in 3G networks
Mobile networks are vulnerable to signaling attacks and storms that are caused by traffic
patterns that overload the control plane, and differ from distributed denial of service attacks …
patterns that overload the control plane, and differ from distributed denial of service attacks …
Detection, traceability, and propagation of mobile malware threats
In recent years, the application of smartphones, Android operating systems and mobile
applications have become more prevalent worldwide. To study the traceability, propagation …
applications have become more prevalent worldwide. To study the traceability, propagation …
Security for smart mobile networks: The NEMESYS approach
The growing popularity of smart mobile devices such as smartphones and tablets has made
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …
them an attractive target for cyber-criminals, resulting in a rapidly growing and evolving …
[PDF][PDF] Cellpot: A concept for next generation cellular network honeypots
Smartphones have been shown to be vulnerable. Similarly, cellular networks have been
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …
shown to be vulnerable to denial of service attacks through signaling. Attackers can use …
Signaling attacks in mobile telephony
Mobile telephony based on UMTS uses finite-state control schemes for wireless channels
and for signaling across the network. These schemes are used systematically in various …
and for signaling across the network. These schemes are used systematically in various …
[PDF][PDF] Nomadic honeypots: A novel concept for smartphone honeypots
Intelligence on mobile threats is a valuable asset. Honeypots showed to provide a good
resource to gain threat intelligence in other areas. Unfortunately, current malware largely …
resource to gain threat intelligence in other areas. Unfortunately, current malware largely …
USB connection vulnerabilities on android smartphones: Default and vendors' customizations
We expose an USB vulnerability in some vendors' customization of the android system,
where the serial AT commands processed by the cellular modem are extended to allow …
where the serial AT commands processed by the cellular modem are extended to allow …
Security analysis and protection based on smali injection for android applications
J Xu, S Li, T Zhang - Algorithms and Architectures for Parallel Processing …, 2014 - Springer
Smali code and. Dex file can be completely compiled and decompiled reciprocally. Thus any
new functions can be injected into an existing android application directly after decompiling …
new functions can be injected into an existing android application directly after decompiling …
Control of maximum transmission unit size discovery using AT commands
CC Huang-Fu, CHU Weirong, YS Jheng - US Patent 10,142,251, 2018 - Google Patents
(57) ABSTRACT A method of control Maximum Transmission Unit (MTU) reporting and
discovery using AT commands is proposed. In communications networks, the MTU of a …
discovery using AT commands is proposed. In communications networks, the MTU of a …