Results 21 to 30 of about 31,732 (193)
Detection, Traceability, and Propagation of Mobile Malware Threats
In recent years, the application of smartphones, Android operating systems and mobile applications have become more prevalent worldwide. To study the traceability, propagation, and detection of the threats, we perform research on all aspects of the end ...
Long Chen +3 more
doaj +1 more source
A Client/Server Malware Detection Model Based on Machine Learning for Android Devices
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices.
Arthur Fournier +2 more
doaj +1 more source
Android malicious attacks detection models using machine learning techniques based on permissions [PDF]
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras +4 more
doaj +1 more source
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj +1 more source
As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware.
Abimbola G. Akintola +9 more
doaj +1 more source
Heterogeneous and mobile wireless sensor networks (HMWSNs) are generally practical in constructing smart Internet of Things. However, malware can easily propagate itself over HMWSNs and make harm such as data interception and unauthorized activities.
Shigen Shen +5 more
doaj +1 more source
A Study on Formal Methods to Generalize Heterogeneous Mobile Malware Propagation and Their Impacts
Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are becoming essential elements of our modern lives. Their large-scale pervasive deployment within the population has already attracted many malware authors, cybercriminals, and
Arash Mahboubi +2 more
doaj +1 more source
Completely Automated Public Physical test to tell Computers and Humans Apart: A usability study on mobile devices [PDF]
A very common approach adopted to fight the increasing sophistication and dangerousness of malware and hacking is to introduce more complex authentication mechanisms.
Alessio, Merlo +2 more
core +1 more source
Mobile malware mutates - [News] [PDF]
A new study analyzing more than a million samples of Android malware illustrates how malicious apps have evolved over time. The results, published in IEEE Transactions on Dependable and Secure Computing, show that malware coding is becoming more cleverly hidden, or obfuscated.
openaire +1 more source
On the Evaluation of Android Malware Detectors
Malware is an umbrella term used for viruses, worms, and Trojans. These days malware is becoming a great threat to the Android users. A malware detector which is commonly known as an antivirus or virus scanner avoids a malicious file to infiltrate into a
Hassan Rafiq +2 more
doaj +5 more sources

