Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Malware threats and detection for industrial mobile-IoT networks

S Sharmeen, S Huda, JH Abawajy, WN Ismail… - IEEE …, 2018 - ieeexplore.ieee.org
Industrial IoT networks deploy heterogeneous IoT devices to meet a wide range of user
requirements. These devices are usually pooled from private or public IoT cloud providers. A …

Age group detection using smartphone motion sensors

E Davarci, B Soysal, I Erguler, SO Aydin… - 2017 25th European …, 2017 - ieeexplore.ieee.org
Side-channel attacks revealing the sensitive user data through the motion sensors (such as
accelerometer, gyroscope, and orientation sensors) emerged as a new trend in the …

On Existence of Common Malicious System Call Codes in Android Malware Families

R Surendran, T Thomas… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Most of the existing Android malware detection mechanisms are based on machine learning
algorithms. The problem with the machine learning approaches is the difficulty in finding the …

Detection of malware applications from centrality measures of syscall graph

R Surendran, T Thomas - Concurrency and Computation …, 2022 - Wiley Online Library
These days it is found that malware authors tend to create new variants of existing Android
malware by using various kinds of obfuscation techniques. These kinds of obfuscated …

Android smartphone vulnerabilities: A survey

J Joshi, C Parekh - 2016 International Conference on Advances …, 2016 - ieeexplore.ieee.org
Round the globe mobile devices like Smartphone, PDAs & tablets are playing an essential
role in every person day to day lives. Various operating systems such as android, ios …

Detection, traceability, and propagation of mobile malware threats

L Chen, C Xia, S Lei, T Wang - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the application of smartphones, Android operating systems and mobile
applications have become more prevalent worldwide. To study the traceability, propagation …

Finding Vulnerabilities in E-Governance Apps of Android Platform

A Ankur, S Patel - 2022 2nd International Conference on …, 2022 - ieeexplore.ieee.org
Around the globe, mobile devices like Smartphones, PDAs & tablets are playing an essential
role in every person's day to day life. Out of various operating systems, Android OS is one of …

Comparative analysis of logical acquisition using Wondershare Dr. Fone, MOBILedit Forensic, and FonePaw on android phones

NF Salimi, NB Abd Warif, NS N Ismail - Malaysian Journal of …, 2022 - ir.uitm.edu.my
The increasing number of mobile phone usage in storing confidential information, such as
mobile online transactions has led to the growing number of research in mobile forensic …

A review on mobile operating systems and application development platforms

A Almisreb, HH Mulalić, N Mučibabić… - Sustainable …, 2019 - sei.ardascience.com
The previous existing mobile technologies were only limited to voice and short messages,
organized between several network operators and service providers. However, recent …