Hybrid Android Malware Detection: A Review of Heuristic-Based Approach

RA Yunmar, SS Kusumawardani, F Mohsen - IEEE Access, 2024 - ieeexplore.ieee.org
Over the last decade, numerous research efforts have been dedicated to countering
malicious mobile applications. Given its market share, Android OS has been the primary …

Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover

A Prayogi, RF Aji - Jurnal RESTI (Rekayasa Sistem dan Teknologi …, 2023 - jurnal.iaii.or.id
The Covid-19 pandemic has kept almost everyone at home and forced them to perform
online activities using their mobile gadgets. Penetration of the Internet and mobile use is …

Problems and Demanding Situations in Traditional Cryptography: An Insistence for Quantum Computing to Secure Private Information

D DShivaprasad, MS Yoosuf… - … and Applications of …, 2023 - Wiley Online Library
Most of the traditional cryptographic algorithms are based on mathematical models and try to
perform encryption/decryption by factoring large numbers as their prime values. Both public …