A Alzubaidi - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the global pervasiveness of smartphones has prompted the development of millions of free and commercially available applications. These applications allow users to …
Mobile devices have evolved and experienced an immense popularity over the last few years. This growth however has exposed mobile devices to an increasing number of security …
AS Shamili, C Bauckhage… - 2010 20th International …, 2010 - ieeexplore.ieee.org
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect malicious software (malware) on a network of mobile devices. The light-weight system …
This paper addresses the problem of efficient intrusion detection for mobile devices via correlating the user's location and time data. We developed two statistical profiling …
Mobile devices are becoming the most popular way of connection, but protocols supporting mobility represent a serious source of concerns because their initial design did not enforce …
X Meng, G Spanoudakis - Risks and Security of Internet and Systems …, 2016 - Springer
As the use of mobile devices spreads dramatically, hackers have started making use of mobile botnets to steal user information or perform other malicious attacks. To address this …
The appearance of a new Android platform and its popularity has resulted in a sharp rise in the number of reported vulnerabilities and consequently in the number of mobile threats …
MH Kim, W Toyib, MG Park - KIPS Transactions on Computer and …, 2013 - academia.edu
Recently software security of the smart phone is an important issue in the field of information science and technology due to fast propagation of smart technology in our life. The smart …