Showing 1 - 11 results of 11 for search '"mobile security"', query time: 0.04s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5

    A hierarchy model on the research fields of cyberspace security technology by Bin-xing FANG

    Published 2015-12-01
    “…Cyberspace security is an interdisciplinary subject involved with computer science and technology,in-formation and communication engineering,control science and engineering and cryptography.It has an explicit and in-depth discipline connotation.First,the concepts of cyberspace security were advanced,and the definition was given.Then,a hierarchy model of cyberspace security was proposed.Based on the model,the details technologies of eight research fields of cyberspace security including information security,information secrecy,information coun-termeasure,cloud security,big data,IOT security,mobile security,and trustable computing were presented.New guidance and experience for the research in cyberspace security could be taken as.…”
    Get full text
    Article
  6. 6

    Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data by Mehwish Naseer, Farhan Ullah, Samia Ijaz, Hamad Naeem, Amjad Alsirhani, Ghadah Naif Alwakid, Abdullah Alomari

    Published 2025-01-01
    “…Android malware detection remains a critical issue for mobile security. Cybercriminals target Android since it is the most popular smartphone operating system (OS). …”
    Get full text
    Article
  7. 7

    Research on naming and addressing technology of the Internet of things by Lingyun JIANG, Yanru MU, Hongbo ZHU

    Published 2018-09-01
    “…With the rapid development of Internet of things,traditional naming and addressing schemes such as IP and URI are facing many challenges,including mobility,security and scalability,etc.In such context,the research progress of naming and addressing technology based on traditional network architecture and future network architecture was described.Then the development trend and core problems in this field were discussed.It was expected to be helpful for the domestic research in the related field.…”
    Get full text
    Article
  8. 8

    Cloud native network for intelligent Internet of everything by Quan YU, Dandan LIANG, Wei ZHANG

    Published 2021-06-01
    “…A new cloud native network architecture for the future network architecture design in the era of intelligent Internet of everything was proposed, that is, network of the cloud, for the cloud, and by the cloud.Furthermore, the concept and mechanism of Cybertwin were proposed to tackle the challenges of mobility, security and availability in cloud native network.Three fundamental questions of cloud native network architecture design were also elaborated, that is, addressing, indexing and resource orchestration.Finally, 6G use cases and future research topics of Cybertwin based cloud native network were discussed.…”
    Get full text
    Article
  9. 9

    Navigating secure storage requirements for EUDI Wallets: a review paper by Zahra Ebadi Ansaroudi, Giada Sciarretta, Andrea De Maria, Silvio Ranise

    Published 2025-01-01
    “…In this study, we first analyze mobile secure storage solutions for the EUDI Wallet, identifying any gaps between current offerings and the EUDI Wallet’s requirements. …”
    Get full text
    Article
  10. 10

    A survey of mobile edge computing by Zishu LI, Renchao XIE, Li SUN, Tao HUANG

    Published 2018-01-01
    “…Mobile edge computing (MEC) technology integrates IT service environment and cloud computing technology at the edge of the network,improving the capacities of computing and storage of the edge of network,reducing network operation and service delivery delay and further enhancing the quality of experience (QoE) of users.Thus,MEC has attracted extensive attention and has been added in the 5G standard as a key technology.Firstly,the basic concept,reference architecture and technical advantages of MEC were introduced,and the current research state of MEC were summarized from three perspectives:academia,industry and standard setting.Then,the key enablers,application scenarios and specific deployment methods of MEC were introduced in detail.Finally,the existing problems of MEC,such as mobility,security and billing,as well as privacy protection,were discussed.…”
    Get full text
    Article
  11. 11

    Machine Learning-Integrated Usability Evaluation and Monitoring of Human Activities for Individuals With Special Needs During Hajj and Umrah by Ghadah Naif Alwakid

    Published 2025-01-01
    “…These acts of worship are still very challenging for the mobility, security, and accessibility of people with special needs. …”
    Get full text
    Article