-
1
<span style="font-variant: small-caps">Ventinel</span>: Automated Detection of Android Vishing Apps Using Optical Character Recognition
Published 2025-01-01Subjects: Get full text
Article -
2
Review of side-channel privacy inference of Android mobile devices
Published 2018-04-01Subjects: Get full text
Article -
3
Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition
Published 2016-10-01Subjects: Get full text
Article -
4
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01Subjects: Get full text
Article -
5
A hierarchy model on the research fields of cyberspace security technology
Published 2015-12-01“…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
Get full text
Article -
6
Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
Published 2025-01-01“…Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). …”
Get full text
Article -
7
Research on naming and addressing technology of the Internet of things
Published 2018-09-01“…With the rapid development of Internet of things,traditional naming and addressing schemes such as IP and URI are facing many challenges,including mobility,security and scalability,etc.In such context,the research progress of naming and addressing technology based on traditional network architecture and future network architecture was described.Then the development trend and core problems in this field were discussed.It was expected to be helpful for the domestic research in the related field.…”
Get full text
Article -
8
Cloud native network for intelligent Internet of everything
Published 2021-06-01“…A new cloud native network architecture for the future network architecture design in the era of intelligent Internet of everything was proposed, that is, network of the cloud, for the cloud, and by the cloud.Furthermore, the concept and mechanism of Cybertwin were proposed to tackle the challenges of mobility, security and availability in cloud native network.Three fundamental questions of cloud native network architecture design were also elaborated, that is, addressing, indexing and resource orchestration.Finally, 6G use cases and future research topics of Cybertwin based cloud native network were discussed.…”
Get full text
Article -
9
Navigating secure storage requirements for EUDI Wallets: a review paper
Published 2025-01-01“…In this study, we first analyze mobile secure storage solutions for the EUDI Wallet, identifying any gaps between current offerings and the EUDI Wallet’s requirements. …”
Get full text
Article -
10
A survey of mobile edge computing
Published 2018-01-01“…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
Get full text
Article -
11
Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah
Published 2025-01-01“…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
Get full text
Article