Blockchain meets metaverse and digital asset management: A comprehensive survey
Envisioned to be the next-generation Internet, the metaverse has been attracting enormous
attention from both the academia and industry. The metaverse can be viewed as a 3D …
attention from both the academia and industry. The metaverse can be viewed as a 3D …
A review of android malware detection approaches based on machine learning
K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are develo** rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …
malware is also emerging in an endless stream. Many researchers have studied the …
Android HIV: A study of repackaging malware for evading machine-learning detection
Machine learning-based solutions have been successfully employed for the automatic
detection of malware on Android. However, machine learning models lack robustness to …
detection of malware on Android. However, machine learning models lack robustness to …
The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments
S Dong, K Abbas, R Jain - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, software defined networks (SDNs) and cloud computing have been widely
adopted by researchers and industry. However, widespread acceptance of these novel …
adopted by researchers and industry. However, widespread acceptance of these novel …
Android security: a survey of issues, malware penetration, and defenses
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …
games, vehicle guidance using location-based services apart from conventional services …
Detecting crypto-ransomware in IoT networks based on energy consumption footprint
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …
connected devices or things such as Android devices, and devices that have more …
Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
A survey on sensor-based threats and attacks to smart devices and applications
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …
lives. From small household devices to large industrial machines, smart devices have …
Security and privacy challenges in mobile cloud computing: Survey and way ahead
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …
mobile devices. However, the growth of mobile computing can be enhanced by integrating …