Context: Diversification and obfuscation are promising techniques for securing software and protecting computers from harmful malware. The goal of these techniques is not removing …
Android OS popularity has given significant rise to malicious apps targeting it. Malware use state of the art obfuscation methods to hide their functionality and evade anti-malware …
S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic growth of Android malware. Malware developers are also able to evade the detection …
M Hatamian - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of technology in recent years, we are surrounded by or even dependent on the use of technological devices such as smartphones as they are now an …
F Nausheen, SH Begum - 2018 2nd International Conference …, 2018 - ieeexplore.ieee.org
With all the exciting benefits of IoT in healthcare—from mobile applications to wearable and implantable health gadgets-it becomes prominent to ensure that patients, their medical data …
Internet of things (IoT) has led to several security threats and challenges within society. Regardless of the benefits that it has brought with it to the society, IoT could compromise the …
J Zhang, H Jiang, Z Ren, X Chen - IEEE Access, 2017 - ieeexplore.ieee.org
Application programming interface (API)-related questions are increasingly posted and discussed by developers in popular question and answer forums, such as Stack Overflow …
Data crowdsourcing is a increasingly pervasive and lifestyle-changing technology, due to the flywheel effect that results from the interaction between the internet of things and cloud …
D Andročec, N Vrček - 13th International conference on software …, 2018 - scitepress.org
Internet of things (IoT) is nowadays one of the fastest growing technologies for both private and business purposes. Due to a big number of IoT devices and their rapid introduction to …