Network intrusion detection for IoT security based on learning techniques

N Chaabouni, M Mosbah, A Zemmari… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Pervasive growth of Internet of Things (IoT) is visible across the globe. The 2016 Dyn
cyberattack exposed the critical fault-lines among smart networks. Security of IoT has …

A survey on various threats and current state of security in android platform

P Bhat, K Dutta - ACM Computing Surveys (CSUR), 2019 - dl.acm.org
The advent of the Android system has brought smartphone technology to the doorsteps of
the masses. The latest technologies have made it affordable for every section of the society …

Application of deep learning to cybersecurity: A survey

S Mahdavifar, AA Ghorbani - Neurocomputing, 2019 - Elsevier
Abstract Cutting edge Deep Learning (DL) techniques have been widely applied to areas
like image processing and speech recognition so far. Likewise, some DL work has been …

Android HIV: A study of repackaging malware for evading machine-learning detection

X Chen, C Li, D Wang, S Wen, J Zhang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Machine learning-based solutions have been successfully employed for the automatic
detection of malware on Android. However, machine learning models lack robustness to …

Constructing features for detecting android malicious applications: issues, taxonomy and directions

W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li… - IEEE …, 2019 - ieeexplore.ieee.org
The number of applications (apps) available for smart devices or Android based IoT (Internet
of Things) has surged dramatically over the past few years. Meanwhile, the volume of ill …

Rmvdroid: towards a reliable android malware dataset with app metadata

H Wang, J Si, H Li, Y Guo - 2019 IEEE/ACM 16th international …, 2019 - ieeexplore.ieee.org
A large number of research studies have been focused on detecting Android malware in
recent years. As a result, a reliable and large-scale malware dataset is essential to build …

Understanding the evolution of android app vulnerabilities

J Gao, L Li, P Kong, TF Bissyandé… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
The Android ecosystem today is a growing universe of a few billion devices, hundreds of
millions of users and millions of applications targeting a wide range of activities where …

A novel ad-hoc mobile edge cloud offering security services through intelligent resource-aware offloading

T Dbouk, A Mourad, H Otrok, H Tout… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
While the usage of smart devices is increasing, security attacks and malware affecting such
terminals are briskly evolving as well. Mobile security suites exist to defend devices against …

An empirical study of cross‐platform mobile development in industry

A Biørn-Hansen, TM Grønli, G Ghinea… - Wireless …, 2019 - Wiley Online Library
The purpose of this study is to report on the industry's perspectives and opinions on cross‐
platform mobile development, with an emphasis on the popularity, adoption, and arising …

A survey on detection techniques for cryptographic ransomware

E Berrueta, D Morato, E Magaña, M Izal - IEEE Access, 2019 - ieeexplore.ieee.org
Crypto-ransomware is a type of malware that encrypts user files, deletes the original data,
and asks for a ransom to recover the hijacked documents. It is a cyber threat that targets both …