S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard [PDF]
Nowadays, mobile banking becomes a popular tool which consumers can conduct financial transactions such as shopping, monitoring accounts balance, transferring funds and other payments.
Putra, Dea Saka Kurnia +2 more
core +2 more sources
Mobile Application Security Platforms Survey [PDF]
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar +2 more
core +1 more source
Mobile malware traffic detection approach based on value-derivative GRU
For the dramatic increase in the number and variety of mobile malware had created enormous challenge for information security of mobile network users,a value-derivative GRU-based mobile malware traffic detection approach was proposed in order to solve ...
Hanxun ZHOU +5 more
doaj +2 more sources
A Power-Efficient Approach to Detect Mobile Threats on the Emergent Network Environment
Mobile and IoT devices are blooming, and their applications are prevailing worldwide. In the meantime, the Industry 4.0 trend converges industrial control systems with the internet environment, which makes it vulnerable.
Chia-Mei Chen +3 more
doaj +1 more source
Android Malware Family Classification Based on Resource Consumption over Time
The vast majority of today's mobile malware targets Android devices. This has pushed the research effort in Android malware analysis in the last years.
Aniello, Leonardo +5 more
core +1 more source
Enhanced Android Malware Detect Models Based on Explainable Generative Adversarial Networks
With the widespread adoption of smartphones over the past decade, mobile applications have become a primary target for malicious attacks, usually in the form of malware.
Shamma Alshebli +6 more
doaj +1 more source
Research on Operators Mobile Malware Protection Architecture and Key Technologies
In recent years, there is a rapid growth of malware on operators network. It severely threats security of mobile internet. Based on reviewing of existing malware protection technologies, mobile malware protection architecture including both network side ...
Tao Chen +4 more
doaj +2 more sources
Malware Threats and Detection for Industrial Mobile-IoT Networks
Industrial IoT networks deploy heterogeneous IoT devices to meet a wide range of user requirements. These devices are usually pooled from private or public IoT cloud providers. A significant number of IoT cloud providers integrate smartphones to overcome
Shaila Sharmeen +4 more
doaj +1 more source
AndroDFA: Android Malware Classification Based on Resource Consumption
The vast majority of today’s mobile malware targets Android devices. An important task of malware analysis is the classification of malicious samples into known families.
Luca Massarelli +5 more
doaj +1 more source
Artificial Intelligence Algorithms for Malware Detection in Android-Operated Mobile Devices
With the rapid expansion of the use of smartphone devices, malicious attacks against Android mobile devices have increased. The Android system adopted a wide range of sensitive applications such as banking applications; therefore, it is becoming the ...
Hasan Alkahtani, Theyazn H. H. Aldhyani
doaj +1 more source

