Lightweight and secure D2D group communication for wireless IoT

J Miao, Z Wang, X Xue, M Wang, J Lv, M Li - Frontiers in Physics, 2023 - frontiersin.org
In recent years, wirless Internet of Things (IoT) technology has developed rapidly, and the
reuse of spectrum resources, network efficiency, and the diversity of multi-communication …

A comprehensive review on permissions-based Android malware detection

Y Sharma, A Arora - International Journal of Information Security, 2024 - Springer
The first Android-ready “G1” phone debuted in late October 2008. Since then, the growth of
Android malware has been explosive, analogous to the rise in the popularity of Android. The …

Integrating Blockchain and Deep Learning for Enhanced Mobile VPN Forensics: A Comprehensive Framework

SS Alqahtany, TA Syed - Applied Sciences, 2024 - mdpi.com
In an era marked by technological advancement, the rising reliance on Virtual Private
Networks (VPNs) necessitates sophisticated forensic analysis techniques to investigate VPN …

Functionality-based mobile application recommendation system with security and privacy awareness

T Rocha, E Souto, K El-Khatib - Computers & Security, 2020 - Elsevier
Nowadays, there are a variety of mobile device applications to execute tasks, such as
paying bills and ordering food. However, some apps (malicious) claim that they perform a …

PHIGrader: Evaluating the effectiveness of Manifest file components in Android malware detection using Multi Criteria Decision Making techniques

Y Sharma, A Arora - Journal of Network and Computer Applications, 2024 - Elsevier
The popularity of the Android operating system has itself become a reason for privacy
concerns. To deal with such malware threats, researchers have proposed various detection …

Security Testing of Android Applications Using Drozer

K AL-Aufi, B Kumar - International Conference on Computational Sciences …, 2023 - Springer
Android applications are extensively utilized however, many of them include security flaws
and malware that serve as entry points for hackers. Drozer is used in the current study to …