Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …
due to business dependencies such as communication, virtual meetings, and access to …
Wrist-based electrodermal activity monitoring for stress detection using federated learning
With the most recent developments in wearable technology, the possibility of continually
monitoring stress using various physiological factors has attracted much attention. By …
monitoring stress using various physiological factors has attracted much attention. By …
The next generation of cloud security through hypervisor-based virtual machine introspection
Cloud computing has become increasingly prevalent in recent years, providing
organizations with on-demand re-sources. While cloud infrastructure has matured with …
organizations with on-demand re-sources. While cloud infrastructure has matured with …
A cybersecurity risk assessment of electric vehicle mobile applications: Findings and recommendations
Electric vehicles (EVs) are becoming increasingly prevalent, with many manufacturers and
third-party developers creating mobile applications to manage and monitor their use. The …
third-party developers creating mobile applications to manage and monitor their use. The …
The Illusion of Randomness: An Empirical Analysis of Address Space Layout Randomization Implementations
Address Space Layout Randomization (ASLR) is a crucial defense mechanism employed by
modern operating systems to mitigate exploitation by randomizing processes? memory …
modern operating systems to mitigate exploitation by randomizing processes? memory …
Security monitoring and management for the network services in the orchestration of SDN-NFV environment using machine learning techniques
N Alshammari, S Shahzadi… - Computer Systems …, 2024 - researchportal.port.ac.uk
Abstract Software Defined Network (SDN) and Network Function Virtualization (NFV)
technology promote several benefits to network operators, including reduced maintenance …
technology promote several benefits to network operators, including reduced maintenance …
DelSec: An Anti-Forensics Data Deletion Framework for Smartphones, IoT, and Edge Devices
N Ullah, M Zahra, B Saleem, M Haseeb… - … on Engineering & …, 2024 - ieeexplore.ieee.org
In the era of smartphones and the Internet of Things (IoT), we are witnessing exponential
growth in data generation. This data encompasses Personal Identifiable Information (PII) …
growth in data generation. This data encompasses Personal Identifiable Information (PII) …
[PDF][PDF] Cybersecurity Threats Detection Using Optimized Machine Learning Frameworks.
Today's world depends on the Internet to meet all its daily needs. The usage of the Internet is
growing rapidly. The world is using the Internet more frequently than ever. The hazards of …
growing rapidly. The world is using the Internet more frequently than ever. The hazards of …
[PDF][PDF] Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection Analysis and Cyber Threat Intelligence Sharing
F Rehman, S Hashmi - Advances in Science, Technology and …, 2023 - researchgate.net
Cloud computing has emerged as a pivotal component of contemporary IT systems,
affording organizations the agility and scalability required to meet the ever-changing …
affording organizations the agility and scalability required to meet the ever-changing …
Identification and Categorization of Unusual Internet of Vehicles Events in Noisy Audio
The volume of multimedia data produced by various smart devices has increased
dramatically with the advent of new digital technologies, including in the Internet of Vehicles …
dramatically with the advent of new digital technologies, including in the Internet of Vehicles …