Mobile Spyware Identification and Categorization: A Systematic Review

M Naser, H Albazar, H Abdel-Jaber - Informatica, 2023 - informatica.si
Smartphones have revolutionized the way we live, work, and interact with the world. They
have become indispensable companions, seamlessly integrating into our daily routines …

Encryption Techniques and Algorithms to Combat Cybersecurity Attacks: A Review

SA Wadho, AF Meghji, A Yichiet, R Kumar… - … on Computer Sciences, 2023 - vfast.org
The danger of cyber-attacks is constant in the current digital environment. The necessity for
effective security actions are more crucial than ever before due to the increasingly complex …

A comparative analysis of recurrent neural network and support vector machine for binary classification of spam short message service

D Odera, G Odiaga - World Journal of Advanced Engineering …, 2023 - mail.wjaets.com
Over the years, communication through Short Message Service (SMS) has been a primary
tool for mobile subscribers. SMS has varied applications in health, industry, finances …

A decentralized and security-enhanced professional title evaluation system in universities under mobile Internet of Things

M Miao, Z Jing, X Xu, M Xue - Heliyon, 2024 - cell.com
Digital online application is a commonly used method for professional title evaluation in
colleges and universities. With the rapid development of the mobile Internet of Things, the …

[HTML][HTML] Enhancing mobile security through comprehensive penetration testing

M Roshanaei - Journal of Information Security, 2024 - scirp.org
In today's era, where mobile devices have become an integral part of our daily lives,
ensuring the security of mobile applications has become increasingly crucial. Mobile …

Development of hybrid intrusion detection system based on Suricata with pfSense method for high reduction of DDoS attacks on IPv6 networks.

S Praptodiyono, T Firmansyah… - Eastern-European …, 2023 - search.ebscohost.com
Abstract Distributed Denial of Service (DDoS) attacks is a problem in computer networks.
DDoS attacks pose a significant threat to internet networks as they cause congestion and …

[PDF][PDF] Developing of Blockchain Method in Message Interchange Systems.

V Poberezhnyk, I Opirskyy - CPITS, 2023 - ceur-ws.org
This paper examines the main blockchain and decentralized application features, their
advantages and disadvantages for use in message interchange systems, and proposes a …

Intrusion Type Classifier: A Machine Learning Based Approach for Automated Detection and Classification of Network Intrusions

A Kumar, I Sharma - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
The increased complexity and frequency of network breaches present substantial obstacles
in network system security maintenance. In order to tackle this issue, a proposed solution is …

[HTML][HTML] A Risk Assessment Framework for Mobile Apps in Mobile Cloud Computing Environments

NO Ogwara, K Petrova, ML Yang, SG MacDonell - Future Internet, 2024 - mdpi.com
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other
users because of their portability, robust connectivity, and ability to house and operate third …

Exposed: Critical Vulnerabilities in USSD Banking Authentication Protocols

Z Lamoyero, O Fajana - … on Cyber Security and Resilience (CSR …, 2023 - ieeexplore.ieee.org
Unstructured Supplementary Service Data (USSD) authentication has been widely adopted
as a popular method for verifying user identity and securing transactions in mobile financial …