Root exploit detection and features optimization: mobile device and blockchain based medical data management

A Firdaus, NB Anuar, MFA Razak, IAT Hashem… - Journal of medical …, 2018 - Springer
The increasing demand for Android mobile devices and blockchain has motivated malware
creators to develop mobile malware to compromise the blockchain. Although the blockchain …

[PDF][PDF] Checking more and alerting less: detecting privacy leakages via enhanced data-flow analysis and peer voting.

K Lu, Z Li, VP Kemerlis, Z Wu, L Lu, C Zheng, Z Qian… - NDSS, 2015 - zhichunli.org
Serious concerns have been raised about stealthy disclosures of private user data in
smartphone apps, and recent research efforts in mobile security have studied various …

An android malware detection approach using weight-adjusted deep learning

W Li, Z Wang, J Cai, S Cheng - 2018 international conference …, 2018 - ieeexplore.ieee.org
Smartphones recently become an indispensable part of our daily lives. Among various
smartphones, Android-based smartphone has become a most popular choice because of …

[PDF][PDF] Anomaly detection in computer networks: A state-of-the-art review.

SWAH Baddar, A Merlo, M Migliardi - J. Wirel. Mob. Networks …, 2014 - jowua.com
The ever-lasting challenge of detecting and mitigating failures in computer networks has
become more essential than ever; especially with the enormous number of smart devices …

Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis

Y Wu, X Li, D Zou, W Yang, X Zhang… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
Malware scanning of an app market is expected to be scalable and effective. However,
existing approaches use either syntax-based features which can be evaded by …

Riskmon: Continuous and automated risk assessment of mobile applications

Y Jing, GJ Ahn, Z Zhao, H Hu - Proceedings of the 4th ACM Conference …, 2014 - dl.acm.org
Mobile operating systems, such as Apple's iOS and Google's Android, have supported a
ballooning market of feature-rich mobile applications. However, helping users understand …

Identifying cyber threats to mobile-IoT applications in edge computing paradigm

J Abawajy, S Huda, S Sharmeen, MM Hassan… - Future Generation …, 2018 - Elsevier
The malware has become an increasing problem for Mobile-Internet of Things applications
in edge computing platform. Variants of malware can be identified once their general …

RThreatDroid: A ransomware detection approach to secure IoT based healthcare systems

MJ Iqbal, S Aurangzeb, M Aleem… - … on Network Science …, 2022 - ieeexplore.ieee.org
The use of smartphone devices in healthcare has increased manifold due to their
widespread use and ease of integration with Internet of Things (IoT) based medical devices …

Towards predictive analysis of android vulnerability using statistical codes and machine learning for IoT applications

J Cui, L Wang, X Zhao, H Zhang - Computer Communications, 2020 - Elsevier
Abstract Recently, the Internet of Things (IoT) technology is used for several applications for
exchanging information among various devices. The intelligent IoT based system utilizes an …

AdDroid: rule-based machine learning framework for android malware analysis

A Mehtab, WB Shahid, T Yaqoob, MF Amjad… - Mobile Networks and …, 2020 - Springer
Recent years have witnessed huge growth in Android malware development. Colossal
reliance on Android applications for day to day working and their massive development …