Security for 5G and beyond

I Ahmad, S Shahabuddin, T Kumar… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
The development of the fifth generation (5G) wireless networks is gaining momentum to
connect almost all aspects of life through the network with much higher speed, very low …

Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions

BAS Al-Rimy, MA Maarof, SZM Shaid - Computers & Security, 2018 - Elsevier
Ransomware is a malware category that exploits security mechanisms such as cryptography
in order to hijack user files and related resources and demands money in exchange for the …

MLDroid—framework for Android malware detection using machine learning techniques

A Mahindru, AL Sangal - Neural Computing and Applications, 2021 - Springer
This research paper presents MLDroid—a web-based framework—which helps to detect
malware from Android devices. Due to increase in the popularity of Android devices …

Intelligent mobile malware detection using permission requests and API calls

M Alazab, M Alazab, A Shalaginov, A Mesleh… - Future Generation …, 2020 - Elsevier
Malware is a serious threat that has been used to target mobile devices since its inception.
Two types of mobile malware attacks are standalone: fraudulent mobile apps and injected …

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

A Azmoodeh, A Dehghantanha, M Conti… - Journal of Ambient …, 2018 - Springer
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …

Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Machine learning meets communication networks: Current trends and future challenges

I Ahmad, S Shahabuddin, H Malik, E Harjula… - IEEE …, 2020 - ieeexplore.ieee.org
The growing network density and unprecedented increase in network traffic, caused by the
massively expanding number of connected devices and online services, require intelligent …

[Retracted] Artificial Intelligence for Education and Teaching

Y Xue, Y Wang - Wireless Communications and Mobile …, 2022 - Wiley Online Library
Artificial intelligence has entered an unprecedented period of rapid growth and is completely
changing all aspects of life. The state needed a comprehensive curriculum, but how to get …

Trends and challenges in network covert channels countermeasures

L Caviglione - Applied Sciences, 2021 - mdpi.com
Network covert channels are increasingly used to endow malware with stealthy behaviors,
for instance to exfiltrate data or to orchestrate nodes of a botnet in a cloaked manner …

A survey on dynamic mobile malware detection

P Yan, Z Yan - Software Quality Journal, 2018 - Springer
The outstanding advances of mobile devices stimulate their wide usage. Since mobile
devices are coupled with third-party applications, lots of security and privacy problems are …