A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

A multi-perspective malware detection approach through behavioral fusion of api call sequence

E Amer, I Zelinka, S El-Sappagh - Computers & Security, 2021 - Elsevier
The widespread development of the malware industry is considered the main threat to our e-
society. Therefore, malware analysis should also be enriched with smart heuristic tools that …

Detecting malware by analyzing app permissions on android platform: A systematic literature review

A Ehsan, C Catal, A Mishra - Sensors, 2022 - mdpi.com
Smartphone adaptation in society has been progressing at a very high speed. Having the
ability to run on a vast variety of devices, much of the user base possesses an Android …

Sok: Content moderation for end-to-end encryption

S Scheffler, J Mayer - arXiv preprint arXiv:2303.03979, 2023 - arxiv.org
Popular messaging applications now enable end-to-end-encryption (E2EE) by default, and
E2EE data storage is becoming common. These important advances for security and privacy …

A multiview learning method for malware threat hunting: windows, IoT and android as case studies

H Darabian, A Dehghantanha, S Hashemi, M Taheri… - World Wide Web, 2020 - Springer
Malware remains a threat to our cyberspace and increasingly digitalized society. Current
malware hunting techniques employ a variety of features, such as OpCodes, ByteCodes …

[HTML][HTML] EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion

W Wei, J Wang, Z Yan, W Ding - Information Fusion, 2022 - Elsevier
Android has stood at a predominant position in mobile operating systems for many years.
However, its popularity and openness make it a desirable target of malicious attackers …

Privacy-preserving deduplication of sensor compressed data in distributed fog computing

C Zhang, Y Miao, Q Xie, Y Guo, H Du… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Distributed fog computing has received wide attention recently. It enables distributed
computing and data management on the network nodes within the close vicinity of IoT …

Mitigation Techniques for Cyber Attacks: A Systematic Mapping Study

K Ishaq, S Fareed - arXiv preprint arXiv:2308.13587, 2023 - arxiv.org
In the wake of the arrival of digital media, the Internet, the web, and online social media, a
flood of new cyber security research questions have emerged. There is a lot of money being …

PPSB: An open and flexible platform for privacy-preserving safe browsing

H Cui, Y Zhou, C Wang, X Wang, Y Du… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Safe Browsing (SB) is an important security feature in modern web browsers to help detect
new unsafe websites. Although useful, recent studies have pointed out that the widely …

Smart computing and cyber technology for cyberization

X Zhou, FC Delicato, KIK Wang, R Huang - World Wide Web, 2020 - Springer
Following the well-known concepts of computerization and informatization, an emerging era
of cyberization, which is considered as a reformation of the present physical, social and …