A performance-sensitive malware detection system using deep learning on mobile devices

R Feng, S Chen, X Xie, G Meng… - … on Information …, 2020 - ieeexplore.ieee.org
… For example, more and more users store their personal data in mobile devices [1], [2] … We
extract the opcode sequences for each smali file by matching it to the opcode list [43]. For the …

[图书][B] Cyber foraging: Bridging mobile and cloud computing

J Flinn - 2022 - books.google.com
… to host computation and store data on behalf of nearby mobile devices. It then describes how
… We list these systems in order from the oldest to the newest. RPF executes compile tasks. …

IoT ecosystem: A survey on devices, gateways, operating systems, middleware and communication

S Bansal, D Kumar - International Journal of Wireless Information …, 2020 - Springer
… and analytical operations on the stored data and using the facts and figures it process the …
, it creates a list of new concerns leading to privacy and information security breach. Security is …

Dynamic reciprocal authentication protocol for mobile cloud computing

AA Ahmed, K Wendy, MN Kabir… - IEEE Systems …, 2020 - ieeexplore.ieee.org
… the mobile device authentication scheme is vulnerable to known session-specific attacks
where temporary information stored in the mobile device … Our evaluation list covers following 16 …

Intelligent mobile malware detection using permission requests and API calls

M Alazab, M Alazab, A Shalaginov, A Mesleh… - … Computer Systems, 2020 - Elsevier
… on the Google Play Store, and (iii) the device’s compatibility with … Android is an open-source
operating system for mobile devices … ’s resources; each application has a list of permissions …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - Journal of Information …, 2020 - Elsevier
… A technology to store and maintain user's information that is mostly used … in the CC
environment, and they also provided a list of … system and a mobile device, existing attacks in …

Designing the information educational environment of the studying course for the educational process management using cloud services

О Карінцева, А Євдокимов… - Mechanism of an …, 2020 - mer-journal.sumy.ua
… distributed operating system or mobile device are enough. … -owned data warehouse, allows
users to store their data on cloud … Students also create a Classroom folder with subfolders for …

Two-factor mutual authentication offloading for mobile cloud computing

A Derhab, M Belaoued, M Guerroumi, FA Khan - IEEE Access, 2020 - ieeexplore.ieee.org
… – Mobile authenticator: It comprises the list of authentication … the user and installed on the
mobile device. It applies a policy … information, the mobile authenticator is invoked to store them …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - … and distributed system …, 2020 - par.nsf.gov
… others identify devices across networks based on the list of … data of 1.03 million Android apps
from the Google Play Store and … look at the TCP and UDP flows of each mobile device. Per …

Unblind your apps: Predicting natural-language labels for mobile gui components by deep learning

J Chen, C Chen, Z Xing, X Xu, L Zhu, G Li… - Proceedings of the ACM …, 2020 - dl.acm.org
… The recent rise of smart mobile phones provides a new … mobile apps in Google Play [11]
and App store [8], the smart … trigger an additional action (add this song to favorite list), “like…