A survey of android application and malware hardening

V Sihag, M Vardhan, P Singh - Computer Science Review, 2021 - Elsevier
In the age of increasing mobile and smart connectivity, malware poses an ever evolving
threat to individuals, societies and nations. Anti-malware companies are often the first and …

[HTML][HTML] Diversification and obfuscation techniques for software security: A systematic literature review

S Hosseinzadeh, S Rauti, S Laurén, JM Mäkelä… - Information and …, 2018 - Elsevier
Context: Diversification and obfuscation are promising techniques for securing software and
protecting computers from harmful malware. The goal of these techniques is not removing …

BLADE: Robust malware detection against obfuscation in android

V Sihag, M Vardhan, P Singh - Forensic Science International: Digital …, 2021 - Elsevier
Android OS popularity has given significant rise to malicious apps targeting it. Malware use
state of the art obfuscation methods to hide their functionality and evade anti-malware …

[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic
growth of Android malware. Malware developers are also able to evade the detection …

Engineering privacy in smartphone apps: A technical guideline catalog for app developers

M Hatamian - IEEE Access, 2020 - ieeexplore.ieee.org
With the rapid growth of technology in recent years, we are surrounded by or even
dependent on the use of technological devices such as smartphones as they are now an …

Healthcare IoT: Benefits, vulnerabilities and solutions

F Nausheen, SH Begum - 2018 2nd International Conference …, 2018 - ieeexplore.ieee.org
With all the exciting benefits of IoT in healthcare—from mobile applications to wearable and
implantable health gadgets-it becomes prominent to ensure that patients, their medical data …

[PDF][PDF] Using machine learning to build a classification model for iot networks to detect attack signatures

M Al-Akhras, M Alawairdhi, A Alkoudari… - Int. J. Comput. Netw …, 2020 - academia.edu
Internet of things (IoT) has led to several security threats and challenges within society.
Regardless of the benefits that it has brought with it to the society, IoT could compromise the …

Recommending apis for api related questions in stack overflow

J Zhang, H Jiang, Z Ren, X Chen - IEEE Access, 2017 - ieeexplore.ieee.org
Application programming interface (API)-related questions are increasingly posted and
discussed by developers in popular question and answer forums, such as Stack Overflow …

DYNAMO: Distributed leisure yacht-carried sensor-network for atmosphere and marine data crowdsourcing applications

R Montella, S Kosta, I Foster - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Data crowdsourcing is a increasingly pervasive and lifestyle-changing technology, due to
the flywheel effect that results from the interaction between the internet of things and cloud …

[PDF][PDF] Machine learning for the internet of things security: a systematic

D Andročec, N Vrček - 13th International conference on software …, 2018 - scitepress.org
Internet of things (IoT) is nowadays one of the fastest growing technologies for both private
and business purposes. Due to a big number of IoT devices and their rapid introduction to …