Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Steganography in modern smartphones and mitigation techniques
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Information hiding as a challenge for malware detection
Information Hiding as a Challenge for Malware Detection Page 1 Information Hiding as a
Challenge for Malware Detection Wojciech Mazurczyk | Warsaw University of Technology …
Challenge for Malware Detection Wojciech Mazurczyk | Warsaw University of Technology …
Seeing the unseen: revealing mobile malware hidden communications via energy consumption and artificial intelligence
Modern malware uses advanced techniques to hide from static and dynamic analysis tools.
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …
To achieve stealthiness when attacking a mobile device, an effective approach is the use of …
Covert channels in personal cloud storage services: The case of Dropbox
Personal storage services are one of the most popular applications based on the cloud
computing paradigm. Therefore, the analysis of possible privacy and security issues has …
computing paradigm. Therefore, the analysis of possible privacy and security issues has …
Towards a systematic study of the covert channel attacks in smartphones
Recently, there is a great attention on the smartphones security and privacy due to their
increasing number of users and wide range of apps. Mobile operating systems such as …
increasing number of users and wide range of apps. Mobile operating systems such as …
Building packet length covert channel over mobile VoIP traffics
Abstract Mobile VoIP (Voice over Internet Protocol) has shown its widely prevalence and laid
the feasibility for concealed communication. VoIP contains continuous and huge amount of …
the feasibility for concealed communication. VoIP contains continuous and huge amount of …
No free charge theorem: A covert channel via usb charging cable on mobile devices
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
smartphones and tablets. At the same time, thanks to the technological innovation and to the …
A New Sensors‐Based Covert Channel on Android
Covert channels are not new in computing systems, and have been studied since their first
definition four decades ago. New platforms invoke thorough investigations to assess their …
definition four decades ago. New platforms invoke thorough investigations to assess their …
pcapStego: A tool for generating traffic traces for experimenting with network covert channels
The increasing diffusion of malware endowed with steganographic and cloaking capabilities
requires tools and techniques for conducting research activities, testing real deployments …
requires tools and techniques for conducting research activities, testing real deployments …