Deep learning feature exploration for android malware detection

N Zhang, Y Tan, C Yang, Y Li - Applied Soft Computing, 2021 - Elsevier
Android mobile devices and applications are widely deployed and used in industry and
smart city. Malware detection is one of the most powerful and effective approaches to …

What Exactly is a Laboratory in Computer Science?

M Soll - 2023 IEEE Global Engineering Education Conference …, 2023 - ieeexplore.ieee.org
This work presents a large scale literature review on the question of what a laboratory in
computer science is. This question arises since computer science has different traditions …

Building an IT Security Laboratory for Complex Teaching Scenarios Using 'Infrastructure as Code'

M Soll, H Helmken, M Belde… - 2023 IEEE Global …, 2023 - ieeexplore.ieee.org
There are increasing demands for IT security education which could be partly met by easier
access to IT security laboratories. This paper proposes the use of 'Infrastructure as …

Practice-oriented smartphone security exercises for developing cybersecurity mindset in high school students

LM Podila, JP Bandreddi, JI Campos… - … , and Learning for …, 2020 - ieeexplore.ieee.org
Advancements in technology and the increase in Internet usage through mobile devices
have led to greater visibility of organizations and individuals to cybercrimes. Teenagers …

Obfuscated android application development

P Graux, JF Lalande, VVT Tong - Proceedings of the Third Central …, 2019 - dl.acm.org
Obfuscation techniques help developers to hide their code when distributing an Android
application. The used techniques are linked to the features provided by the programming …

Android Permission Classifier: a deep learning algorithmic framework based on protection and threat levels

M Ashawa, S Morris - Security and Privacy, 2021 - Wiley Online Library
Recent works demonstrated that Android is the fastest growing mobile OS with the highest
number of users worldwide. Android's popularity is facilitated by factors such as ease of use …

PWN The Learning Curve: Education-First CTF Challenges

C Nelson, Y Shoshitaishvili - Proceedings of the 55th ACM Technical …, 2024 - dl.acm.org
We address the pressing need for effective and scalable cybersecurity education
methodologies for undergraduate students. While Capture The Flag (CTF) challenges have …

Understanding security vulnerabilities in student code: A case study in a non-security course

T Yilmaz, Ö Ulusoy - Journal of Systems and Software, 2022 - Elsevier
Secure coding education is quite important for students to acquire the skills to quickly adapt
to the evolving threats towards the software they are expected to create once they graduate …

Effecting mobile security awareness and interest in cybersecurity using the CovertEyeOp mobile app driven user hack based learning approach

T Poe, A Chattopadhyay - Education and Information Technologies, 2023 - Springer
Existing research literature in computing and IT education shows that there has been limited
work on investigating how offense based learning approaches using hacks can enhance …

Hacking the learning curve: Effective cybersecurity education at scale

CD Nelson - 2024 - keep.lib.asu.edu
This dissertation introduces a comprehensive framework aimed at reshaping applied
cybersecurity education to significantly ease the learning curve, at scale, through three …