Results 41 to 50 of about 31,732 (193)

S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]

open access: yes, 2017
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia   +2 more
core   +2 more sources

Mobile Application Security Platforms Survey [PDF]

open access: yes, 2016
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar   +2 more
core   +1 more source

Mobile malware traffic detection approach based on value-derivative GRU

open access: yesTongxin xuebao, 2020
For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve ...
Hanxun ZHOU   +5 more
doaj   +2 more sources

A Power-Efficient Approach to Detect Mobile Threats on the Emergent Network Environment

open access: yesIEEE Access, 2020
Mobile and IoT devices are blooming, and their applications are prevailing worldwide. In the meantime, the Industry 4.0 trend converges industrial control systems with the internet environment, which makes it vulnerable.
Chia-Mei Chen   +3 more
doaj   +1 more source

Android Malware Family Classification Based on Resource Consumption over Time

open access: yes, 2017
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years.
Aniello, Leonardo   +5 more
core   +1 more source

Enhanced Android Malware Detect Models Based on Explainable Generative Adversarial Networks

open access: yesIEEE Access
With the widespread adoption of smartphones over the past decade, mobile applications have become a primary target for malicious attacks, usually in the form of malware.
Shamma Alshebli   +6 more
doaj   +1 more source

Research on Operators Mobile Malware Protection Architecture and Key Technologies

open access: yesDianxin kexue, 2014
In recent years, there is a rapid growth of malware on operators network. It severely threats security of mobile internet. Based on reviewing of existing malware protection technologies, mobile malware protection architecture including both network side ...
Tao Chen   +4 more
doaj   +2 more sources

Malware Threats and Detection for Industrial Mobile-IoT Networks

open access: yesIEEE Access, 2018
Industrial IoT networks deploy heterogeneous IoT devices to meet a wide range of user requirements. These devices are usually pooled from private or public IoT cloud providers. A significant number of IoT cloud providers integrate smartphones to overcome
Shaila Sharmeen   +4 more
doaj   +1 more source

AndroDFA: Android Malware Classification Based on Resource Consumption

open access: yesInformation, 2020
The vast majority of today’s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families.
Luca Massarelli   +5 more
doaj   +1 more source

Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices

open access: yesSensors, 2022
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
doaj   +1 more source

Home - About - Disclaimer - Privacy