A survey of MANET intrusion detection & prevention approaches for network layer attacks

A Nadeem, MP Howarth - IEEE communications surveys & …, 2013 - ieeexplore.ieee.org
In the last decade, mobile ad hoc networks (MANETs) have emerged as a major next
generation wireless networking technology. However, MANETs are vulnerable to various …

A survey of intrusion detection in wireless network applications

R Mitchell, R Chen - Computer Communications, 2014 - Elsevier
Abstract Information systems are becoming more integrated into our lives. As this integration
deepens, the importance of securing these systems increases. Because of lower installation …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

M0droid: An android behavioral-based malware detection model

M Damshenas, A Dehghantanha… - Journal of Information …, 2015 - Taylor & Francis
Anti-mobile malware has attracted the attention of the research and security community in
recent years due to the increasing threat of mobile malware and the significant increase in …

Malware detection in embedded systems using neural network model for electromagnetic side-channel signals

HA Khan, N Sehatbakhsh, LN Nguyen… - Journal of Hardware and …, 2019 - Springer
We propose a novel malware detection system for critical embedded and cyber-physical
systems (CPS). The system exploits electromagnetic (EM) side-channel signals from the …

IDEA: Intrusion detection through electromagnetic-signal analysis for critical embedded and cyber-physical systems

HA Khan, N Sehatbakhsh, LN Nguyen… - … on Dependable and …, 2019 - ieeexplore.ieee.org
We propose a novel framework called IDEA that exploits electromagnetic (EM) side-channel
signals to detect malicious activity on embedded and cyber-physical systems (CPS). IDEA …

A survey on energy-aware security mechanisms

A Merlo, M Migliardi, L Caviglione - Pervasive and Mobile Computing, 2015 - Elsevier
The increasing adoption of mobile devices as the preferred tool to access the Internet
imposes to deepen the investigation of security aspects. In parallel, their power constrained …

Detailed tracking of program control flow using analog side-channel signals: a promise for iot malware detection and a threat for many cryptographic implementations

HA Khan, M Alam, A Zajic, M Prvulovic - Cyber Sensing 2018, 2018 - spiedigitallibrary.org
Side-channel signals have long been used in cryptanalysis, and recently they have also
been utilized as a way to monitor program execution without involving the monitored system …

Effects of wi-fi and bluetooth battery exhaustion attacks on mobile devices

BR Moyers, JP Dunning, RC Marchany… - 2010 43rd Hawaii …, 2010 - ieeexplore.ieee.org
This paper provides insight into the ramifications of battery exhaustion Denial of Service
(DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15 …

Power consumption based android malware detection

H Yang, R Tang - Journal of Electrical and Computer …, 2016 - Wiley Online Library
In order to solve the problem that Android platform's sand‐box mechanism prevents security
protection software from accessing effective information to detect malware, this paper …