Blockchain meets metaverse and digital asset management: A comprehensive survey

VT Truong, L Le, D Niyato - Ieee Access, 2023 - ieeexplore.ieee.org
Envisioned to be the next-generation Internet, the metaverse has been attracting enormous
attention from both the academia and industry. The metaverse can be viewed as a 3D …

A review of android malware detection approaches based on machine learning

K Liu, S Xu, G Xu, M Zhang, D Sun, H Liu - IEEE access, 2020 - ieeexplore.ieee.org
Android applications are developing rapidly across the mobile ecosystem, but Android
malware is also emerging in an endless stream. Many researchers have studied the …

Android HIV: A study of repackaging malware for evading machine-learning detection

X Chen, C Li, D Wang, S Wen, J Zhang… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Machine learning-based solutions have been successfully employed for the automatic
detection of malware on Android. However, machine learning models lack robustness to …

The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey on distributed denial of service (DDoS) attacks in SDN and cloud computing environments

S Dong, K Abbas, R Jain - IEEE Access, 2019 - ieeexplore.ieee.org
Recently, software defined networks (SDNs) and cloud computing have been widely
adopted by researchers and industry. However, widespread acceptance of these novel …

Android security: a survey of issues, malware penetration, and defenses

P Faruki, A Bharmal, V Laxmi… - … surveys & tutorials, 2014 - ieeexplore.ieee.org
Smartphones have become pervasive due to the availability of office applications, Internet,
games, vehicle guidance using location-based services apart from conventional services …

Detecting crypto-ransomware in IoT networks based on energy consumption footprint

A Azmoodeh, A Dehghantanha, M Conti… - Journal of Ambient …, 2018 - Springer
Abstract An Internet of Things (IoT) architecture generally consists of a wide range of Internet-
connected devices or things such as Android devices, and devices that have more …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

Static analysis of android apps: A systematic literature review

L Li, TF Bissyandé, M Papadakis, S Rasthofer… - Information and …, 2017 - Elsevier
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …

Security and privacy challenges in mobile cloud computing: Survey and way ahead

MB Mollah, MAK Azad, A Vasilakos - Journal of Network and Computer …, 2017 - Elsevier
The rapid growth of mobile computing is seriously challenged by the resource constrained
mobile devices. However, the growth of mobile computing can be enhanced by integrating …