Comparative analysis of Android and iOS from security viewpoint

S Garg, N Baliyan - Computer Science Review, 2021 - Elsevier
Smartphone usage has increased exponentially in the recent years. Android and iOS are the
most popular smartphone platforms, while the ease of use along with the computational …

Deep learning for android malware defenses: a systematic literature review

Y Liu, C Tantithamthavorn, L Li, Y Liu - ACM Computing Surveys, 2022 - dl.acm.org
Malicious applications (particularly those targeting the Android platform) pose a serious
threat to developers and end-users. Numerous research efforts have been devoted to …

Ensemble-based classification using neural networks and machine learning models for windows pe malware detection

R Damaševičius, A Venčkauskas, J Toldinas… - Electronics, 2021 - mdpi.com
The security of information is among the greatest challenges facing organizations and
institutions. Cybercrime has risen in frequency and magnitude in recent years, with new …

Android spyware detection using machine learning: a novel dataset

MK Qabalin, M Naser, M Alkasassbeh - sensors, 2022 - mdpi.com
Smartphones are an essential part of all aspects of our lives. Socially, politically, and
commercially, there is almost complete reliance on smartphones as a communication tool, a …

[HTML][HTML] Malware detection for mobile computing using secure and privacy-preserving machine learning approaches: A comprehensive survey

F Nawshin, R Gad, D Unal, AK Al-Ali… - Computers and Electrical …, 2024 - Elsevier
Mobile devices have become an essential element in our day-to-day lives. The chances of
mobile attacks are rapidly increasing with the growing use of mobile devices. Exploiting …

No privacy among spies: Assessing the functionality and insecurity of consumer android spyware apps

E Liu, S Rao, S Havron, G Ho, S Savage… - Proceedings on …, 2023 - petsymposium.org
Consumer mobile spyware apps covertly monitor a user's activities (ie, text messages,
phone calls, e-mail, location, etc.) and transmit that information over the Internet to support …

Smartphone Security and Privacy: A Survey on APTs, Sensor-Based Attacks, Side-Channel Attacks, Google Play Attacks, and Defenses

Z Muhammad, Z Anwar, AR Javed, B Saleem, S Abbas… - Technologies, 2023 - mdpi.com
There is an exponential rise in the use of smartphones in government and private institutions
due to business dependencies such as communication, virtual meetings, and access to …

Counteracting dark Web text-based CAPTCHA with generative adversarial learning for proactive cyber threat intelligence

N Zhang, M Ebrahimi, W Li, H Chen - ACM Transactions on …, 2022 - dl.acm.org
Automated monitoring of dark web (DW) platforms on a large scale is the first step toward
developing proactive Cyber Threat Intelligence (CTI). While there are efficient methods for …

Let the cat out of the bag: Popular android iot apps under security scrutiny

E Chatzoglou, G Kambourakis, C Smiliotopoulos - Sensors, 2022 - mdpi.com
The impact that IoT technologies have on our everyday life is indisputable. Wearables, smart
appliances, lighting, security controls, and others make our life simpler and more …

A systematic overview of the machine learning methods for mobile malware detection

Y Kim, JJ Lee, MH Go, HY Kang… - Security and …, 2022 - Wiley Online Library
With the deployment of the 5G cellular system, the upsurge of diverse mobile applications
and devices has increased the potential challenges and threats posed to users. Industry and …