Tight arms race: Overview of current malware threats and trends in their detection

L Caviglione, M Choraś, I Corona, A Janicki… - IEEE …, 2020 - ieeexplore.ieee.org
Cyber attacks are currently blooming, as the attackers reap significant profits from them and
face a limited risk when compared to committing the “classical” crimes. One of the major …

Recent advances in android mobile malware detection: A systematic literature review

A Alzubaidi - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the global pervasiveness of smartphones has prompted the development of
millions of free and commercially available applications. These applications allow users to …

DroidPerf: profiling memory objects on android devices

B Li, Q Zhao, S Jiao, X Liu - Proceedings of the 29th annual international …, 2023 - dl.acm.org
Optimizing performance inefficiencies in memory hierarchies is well-known for native
languages, such as C and C++. There are few studies, however, on exploring memory …

Exploratory study on kali NetHunter lite: a digital forensics approach

M Stanković, U Karabiyik - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Mobile devices, specifically smartphones, have become a necessity in everyday life, as we
perform many essential day-to-day tasks using these devices. With the projected increase in …

A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications

Y Kumar, V Kumar - Wireless Personal Communications, 2023 - Springer
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …

Maloid-DS: Labeled Dataset for Android Malware Forensics

I Almomani, T Almashat, W El-Shafai - IEEE Access, 2024 - ieeexplore.ieee.org
Billions of people globally use Android devices (https://backlinko. com/iphone-vs-android-
statistics). As such, these devices are highly targeted by security attackers. One of the most …

Anomaly-Based Intrusion Detection Systems Using Machine Learning.

A Alqahtani, H AlShaher - Journal of Cybersecurity & …, 2024 - search.ebscohost.com
With the increased use of the Internet, unauthorized access has increased, allowing
malicious users to hack networks and carry out malicious activities. One of the essential …

Guarding android: A comprehensive review of intrusion detection techniques for smartphones

IM Ibrahim, AB Sallow - Science Journal of University of Zakho, 2023 - sjuoz.uoz.edu.krd
The popularity of using the Android operating system has increased the number of
developers and intruders in this field. Many applications are developed in this area and …

Experience report on the challenges and opportunities in securing smartphones against zero-click attacks

N Shafqat, C Topcuoglu, E Kirda… - arXiv preprint arXiv …, 2022 - arxiv.org
Zero-click attacks require no user interaction and typically exploit zero-day (ie, unpatched)
vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root …

DFRMIdroid: A Comprehensive Fusion Approach Utilizing Permissions and Intents Analysis with the DFR-MI Algorithm for Enhanced Malware Detection on Android …

IM Ibrahim, AB Sallow - Revue d'Intelligence Artificielle, 2024 - search.ebscohost.com
Smartphones based on the Android operating system are increasingly popular due to their
multifunctional capabilities in various fields. However, these functions have also encouraged …