Enviar búsqueda
Cargar
20120130406025
•
1 recomendación
•
677 vistas
IAEME Publication
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 8
Descargar ahora
Descargar para leer sin conexión
Recomendados
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
IRJET- An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
Introduction to cloud security
Introduction to cloud security
IAEME Publication
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
Cloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
Recomendados
Malware threat analysis techniques and approaches for IoT applications: a review
Malware threat analysis techniques and approaches for IoT applications: a review
journalBEEI
IRJET- An Overview on Mobile Cloud Computing
IRJET- An Overview on Mobile Cloud Computing
IRJET Journal
INFORMATION SECURITY IN CLOUD COMPUTING
INFORMATION SECURITY IN CLOUD COMPUTING
ijitcs
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET- Authentication and Context Awareness Access Control in Internet of Things
IRJET Journal
Introduction to cloud security
Introduction to cloud security
IAEME Publication
Addressing Security Issues and Challenges in Mobile Cloud Computing
Addressing Security Issues and Challenges in Mobile Cloud Computing
Editor IJCATR
Cloud computing and its security aspects
Cloud computing and its security aspects
eSAT Publishing House
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
A Proposed Solution to Secure MCC Uprising Issue and Challenges in the Domain...
IJERD Editor
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
76 s201913
76 s201913
IJRAT
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET Journal
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET Journal
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal
IoT for Everyday Life
IoT for Everyday Life
ijsrd.com
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET Journal
Citrix security booklet
Citrix security booklet
Benjamin Jolivet
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET Journal
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
BlackBerry
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
489 493
489 493
Editor IJARCET
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
IAEME Publication
76 s201918
76 s201918
IJRAT
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
IJNSA Journal
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
A017360104
A017360104
IOSR Journals
Más contenido relacionado
La actualidad más candente
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET Journal
76 s201913
76 s201913
IJRAT
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET Journal
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd Iaetsd
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET Journal
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IRJET Journal
IoT for Everyday Life
IoT for Everyday Life
ijsrd.com
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
mlaij
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
SHREYASSRINATH94
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
ijaprr
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET Journal
Citrix security booklet
Citrix security booklet
Benjamin Jolivet
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET Journal
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
BlackBerry
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET Journal
489 493
489 493
Editor IJARCET
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
IAEME Publication
76 s201918
76 s201918
IJRAT
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
IJNSA Journal
La actualidad más candente
(20)
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
76 s201913
76 s201913
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
IRJET- Enhance Smart Cities Security by Mitigating IoT Vulnerabilities
Iaetsd future polling system using cloud computing in support with smart clie...
Iaetsd future polling system using cloud computing in support with smart clie...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
IRJET - A Joint Optimization Approach to Security and Insurance Managemen...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
Survey on Mobile Cloud Computing [MCC], its Security & Future Research Challe...
IoT for Everyday Life
IoT for Everyday Life
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
A Multi-Level Security for Preventing DDOS Attacks in Cloud Environments
Security aspects-of-mobile-cloud-computing
Security aspects-of-mobile-cloud-computing
Ijaprr vol1-1-1-5dr tejinder
Ijaprr vol1-1-1-5dr tejinder
IRJET-A Review: IoT and Cloud Computing for Future Internet
IRJET-A Review: IoT and Cloud Computing for Future Internet
Citrix security booklet
Citrix security booklet
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
IRJET- Enhancing Security Features for IoT Devices Connected to Cloud Service...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
Android in the Enterprise New Security Enhancements: Google and BlackBerry St...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
IRJET- Resource Management in Mobile Cloud Computing: MSaaS & MPaaS with Femt...
489 493
489 493
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
INTERNET OF THINGS AS A TOOL FOR ENHANCEMENT OF EDUCATION ADMINISTRATION AND ...
76 s201918
76 s201918
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
WEARABLE TECHNOLOGY DEVICES SECURITY AND PRIVACY VULNERABILITY ANALYSIS
Similar a 20120130406025
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
iosrjce
A017360104
A017360104
IOSR Journals
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
IAEME Publication
40120130405016
40120130405016
IAEME Publication
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
IJIR JOURNALS IJIRUSA
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Eswar Publications
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
IJNSA Journal
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
IJNSA Journal
Paper id 27201433
Paper id 27201433
IJRAT
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Publishing House
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
eSAT Journals
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
IAEME Publication
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
Tahmin Aysha Murshed
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
IJNSA Journal
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
IJECEIAES
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
IOSR Journals
Mobile cloud computing implications and challenges
Mobile cloud computing implications and challenges
Alexander Decker
Similar a 20120130406025
(20)
Comparative Study on Intrusion Detection Systems for Smartphones
Comparative Study on Intrusion Detection Systems for Smartphones
A017360104
A017360104
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
Secure hash based distributed framework for utpc based cloud authorization
40120130405016
40120130405016
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Ijirsm poornima-km-a-survey-on-security-circumstances-for-mobile-cloud-computing
Application Security framework for Mobile App Development in Enterprise Setup
Application Security framework for Mobile App Development in Enterprise Setup
Securing Mobile Cloud Using Finger Print Authentication
Securing Mobile Cloud Using Finger Print Authentication
Securing mobile cloud using finger print authentication
Securing mobile cloud using finger print authentication
Paper id 27201433
Paper id 27201433
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
A comprehensive survey on security issues in cloud computing and data privacy...
A survey on secured data outsourcing in cloud computing
A survey on secured data outsourcing in cloud computing
Security and privacy issues and solutions of Mobile Cloud Computing
Security and privacy issues and solutions of Mobile Cloud Computing
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
BIOMETRIC SMARTCARD AUTHENTICATION FOR FOG COMPUTING
Cloud data security and various cryptographic algorithms
Cloud data security and various cryptographic algorithms
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Cloud Computing for hand-held Devices:Enhancing Smart phones viability with C...
Mobile cloud computing implications and challenges
Mobile cloud computing implications and challenges
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Zilliz
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
rafiqahmad00786416
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Nanddeep Nachan
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
MIND CTI
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
MadyBayot
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Overkill Security
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Sandro Moreira
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
apidays
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Último
(20)
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
20120130406025
1.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 4, Issue 6, September – October 2013, pp. 238-245 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET ©IAEME A REVIEW ON CLOUD-BASED INTRUSION DETECTION SYSTEM FOR ANDROID SMARTPHONES 1 Anirudha A. Kolpyakwar, 2 Sonal Honale, 3 Piyush M. Dhande, 4 Pallavi A. Chaudhari 1 Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha, Maharashtra, India 2 Computer Science Engineering, Abha Gaikwad Patil College of Engineering, Nagpur, Maharashtra, India 3 Electronics & Telecommunication, Datta Meghe Institute of Engineering, Technology & Research, Sawangi (Meghe), Wardha, Maharashtra, India 4 Information Technology, Bapurao Deshmukh College of Engineering, Sevagram, Wardha, Maharashtra, India ABSTRACT Cloud computing is primarily being use for eliminating the need of local information resources. The ability of cloud offers vast variety of services on web. As Smartphone usage has been continuously increasing in recent years, but due to its complexity and functionality, they are also susceptible to the attacks such as virus, Trojans and worms. The smart phones have inadequate storage, processing and computational power to execute highly complex algorithms for intrusion detection and implementing signature based attack detection. In this paper, different system architecture for a cloud based intrusion detection and recovery system for Android smart mobile phones are discussed. This architectures offers security against any misbehavior in network. The high level architecture performs analysis on the virtualized and synchronized replica of an actual device in the cloud environment. This analysis on the emulated device includes running multiple detection engines in parallel, memory scanners and system call inconsistency detection that generate responses in event of attack. The responses are instructs to mobile agent installed on the device to take essential actions and perform recovery of device if needed. Keywords: Android Smartphone, Cloud Computing, Intrusion Detection. 238
2.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME INTRODUCTION 1.1 Cloud Computing Cloud computing provides computation, storage, data access, security and software services that do not require end-user knowledge of the physical location and configuration of the system that brings the services [13]. Parallel to this, concept can be drawn with the electricity grid, where endusers consume power without needing to understand the component devices and infrastructure required to provide the service. Cloud computing explains a new supplement, consumption and delivery model for IT services based on internet protocols, and it usually involves provisioning dynamically scalable and often virtualizes resources. It is a consequence of ease-of-access to remote computing sites provided by the internet [13]. This may take form of web based tool or function that user can access and use through web browser as if program were installed locally on their own computers. A cloud computing provider delivers an application via internet, which are accessed from the web browser, desktop or mobile applications, while business software and data stored on servers at remote location. In some cases, legacy applications (line of business applications that until now nave been prevalent in thin client Windows computing) are delivered via a screen-sharing technology [13]. At foundation of cloud computing is broader concept of infrastructure convergence and shared services. This type of data center environment allows enterprises or common user to get their applications up and running faster, with easier manageability and less maintenance, and enables IT to more rapidly adjust IT resources (such as server, storage and networking) to meet fluctuating and unpredictable business demand. Most cloud computing infrastructure consists of services delivered through shared data center and appearing as a single point of access for consumers computing needs. Commercial offering may be required to meet service level agreements (SLA) [13]. 1.2 Android Smartphone Android smartphones are extremely popular fast growing communication devices in recent years [13]. With the advent of internet, the mobile network infrastructure quality and affordability consistently enhanced. As their data transmission become affordable and available, usage of smart mobile phones for online financial transactions, mobile learning and web browsing become widely popular among users which also cause several security issues [1], [13]. For Android based smart phones, there are lot of third party application are available in free of cost on Google Play and various other application store websites. Its easy availability of application encourages attackers to build malicious applications for such devices. As architecture of such devices are much similar to classic personal computers in terms of functionality as well as performance, common security threats like worms, Trojans and viruses are also affecting smart phones [2], [13]. To protect from such threats same security algorithms required that used to secure desktop PC. But these algorithms are highly complex and resource consuming, it cannot be execute on such smart mobile phone devices as they have power, computational and storage limitations. Another problem is inconsistency in software support and security fixes by the manufacturer of Smartphone device. If bug fixes and patches are does not provide by manufacturers to customers then security of Smartphone would be highly compromised and make them vulnerable to attack. This is for example shown by the apparent version fragmentation which can be observed in the Android environment [13]. The consistent updating of software version and fixes makes devices more secure but it lacks in mobile devices. Using firewalls, antivirus scanners, spyware scanners and root kit detectors on smart mobile devices is proves to be difficult, mainly because of lack of resources like battery longevity, computing power and storage. To overcome such limitations of smart mobile phone, Cloud Computing provides plenty of services, software and processing power over an internet. In relation of mobile phones it reduces bandwidth usage, power consumption (battery life) and processing power [3], [4], [13]. Cloud computing, and 239
3.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME specifically Security as a Service (SECaaS), changes the dynamics of protecting smart phones over a network [13]. Using such cloud services we can detect misbehavior in network and send back the response signal which initiates recovery on the smart phone device [5], [13]. In Android smartphones recovery has to be done by putting a device in recovery mode. In the recovery process any damage to mobile phone is recovered and device being restore. The recovery is done by using mobile host agent which is nothing but the android application that been installed in device. This application receives signal from cloud and manages traffic between internet and device [13]. 2. AVAILABLE SECURITY MECHANISM IN ANDROID SMARTPHONES In existing system of protection against malware attacks, Android smartphones are protected by antivirus software (such as Avast, Kaspersky, McAfee) which consumes substantial battery power of a device even in standby mode. In addition to this, antivirus software is based on signature based detection which limits the detection range up to dataset available to that particular software. This dataset set again need to update consistently which affects bandwidth efficiency. Many times such software will not provide coverage to most recent signatures. In this paper, we are suggesting the mechanism that uses the cloud environment and virtualization of mobile device as a mobile host agent that protects device with conservation of vital resources battery, bandwidth and computational power [13]. 2.1 Mechanism of Mobile Host Agent Same as an existing antivirus software, the mobile host agent is also a lightweight process that runs on device and inspects the file activity. The only basic difference is that the mobile host is deals with the cloud services and as mentioned earlier existing antivirus software is signature based having very limited signature database size [6], [13]. The signature database size is keep varying in accordance of different antivirus software but as mobile agent works in collusion with cloud environment, it have advantage over antivirus software in terms of database size, as shown in Table 1. Table 1. The Number of Threats Addressed in the Signature Database of Various Detection Engines Detection Engine Signature Database Size Kaspersky Mobile 284 signature Clam AV 262289 signature Mobile Agent > 5 million + behavior The second major advantage of mobile host agent over antivirus software is ability to run multiple detection engines in parallel. The existing antivirus software cannot run multiple detection engines on a single device due to technical conflicts and resource constraints. The mobile host can use cloud services and run multiple detection engine in parallel by hosting them on emulated device. The use of virtualization to run multiple detection engines increases the coverage malware detection. This also helps to scale a system to large number of users and engines. This allows analyze any single file by various different detection engines [6], [13]. The increased detection coverage against a dataset of malware samples when using multiple engines in parallel Clam AV (CM), Symantec (SM), McAfee (MA), Bit-Defender (BD), and F-Secure (FS), the coverage also increases as illustrated in Table 2. 240
4.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Table 2. The Increased Coverage using Multiple Detection Engines in Parallel Engine Combination Detected Coverage CM 229/469 48.82% CM, SM 290/469 61.83% CM, SM, MA 358/469 76.33% CM, SM, MA, BD 417/469 88.91% CM, SM, MA, BD, FS 430/469 91.68% 2.2 A Mobile System Architecture with Cloud Proxy The proxy server acts as a intermediary which mirrors the ongoing traffic between mobile devices and internet then sends it to the cloud computing services where further in detail analysis has been performed on the basis of behavior pattern and code signature [10]. Using various security . procedures provided by cloud computing services for Android Smartphone, cloud services ensures the ures Smartphone security of device [10]. Using a proxy server permits us to take the advantages of cloud computing which have almost unlimited computing power for analyzing the security of the mobile system. The security mobile security of the entire system depends basically on the security and trust level of the user, the mobile device, the communication channel, and the backend, the cloud as shown in Figure 1. The proxy, which is under company control, is used to collect as much security related information about mpany the precedent components as possible ( example by analyzing network traffic, querying company (for databases for organizational information et cetera). Additionally, the proxy requests information reque directly from the mobile device [10]. . Fig. 1. Mobile System Architecture with Cloud Proxy . 2.3 Synchronization Mechanism Using Proxy Server Figure 2 depicts the synchronization mechanism using Record and Replay technique [9]. In [9 this a computer program is by nature deterministic, but it receives nondeterministic inputs and events that influence its execution flow. To replay a program, we need to record all these nondeterministic inputs and events. Such inputs usually come from the underlying hardware (for example time comes und for from the clock, network data from the Wi-Fi adaptor, location data from the GPS sensor, etc.), which a process receives mostly through system calls to the kernel. Thus, to replay execution the tracer records all data transferred from kernel to user space through system calls. There player then uses the a recorded values when replaying the system calls on the replica. 241
5.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Fig. 2. Synchronization using Proxy Server 3. RELATED WORK Paranoid Android which is an intrusion detection mechanism for Android based smart phones was developed. This system was based on the cloud where intrusion detection used as a service [9]. This mechanism used to mirror the traffic between Smartphone device and internet using proxy server and then analysis was done by replay and record method [9]. A very similar approach Response System for Mobile Phones exists in available Android architecture [5]. In this architecture, to provide intrusion detection through cloud computing where a lightweight mobile host was used to recover the device as well as achieve the input or files from the device and send it to the network. There are many different intrusion detection techniques are used in this system such as game theoretic intrusion and recovery engine that used to plot graph based on the behavior of network or some particular entity [5] The concept of virtualization [6] of devices over a cloud network that helps to emulate all the scenario of security attacks without affecting device itself. Instead of cloud services this system used network services to detection malicious activity. This mechanism used to make replica of actual device on the server which is used in emulation process [6]. The static analysis of executable as well as the integration of a collaborative system for detecting malware on Android based systems [11]. By inspecting files on the function call level and comparing client cache data to already known malware files can be classified as harmful or harmless. The analysis can either be performed locally on the device or offloaded to a remote detection server. This leads to an improved detection rate [11]. Another approach, specifically targeted on the Symbian platform, is described [12]. It is relying on behavioral analysis for detecting malware on mobile devices. The idea is based on the assumption that a single action performed by an application can be classified as harmless, but in relation to other actions, which are performed in the same context, malware behavior can be exposed. Based on this assumption a database of behavioral signatures for malware was developed. By training a support vector machine with normal behavior of applications, anomalies such as malware can be detected [12]. 242
6.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME 4. HIGH LEVEL ARCHITECTURE FOR ANDROID SMART PHONE SECURITY Fig. 3. System Architecture The Android Smartphones are having limitations in computational resources such as processing power, battery longevity and storage capacity which results in poor protection against various security threats. These threats include zero day attacks, memory resident attacks, viruses, Trojans and many other threats. To protect the Smartphone against these threats we need high level intrusion detection algorithms, antivirus software and scanners. Due to limitations of resources Android smartphones cannot protect themselves powerfully against these attacks. The existing antivirus software provides signature based attack detection which again has limitation for signature database size. To overcome such computational limitation the cloud services present in High Level Architectures are very useful key. The cloud computing provides vast set of services which could be access anywhere from the network. The cloud provides security services which could be used for protecting the Smartphone device [13]. High Level architecture consists of a cloud computing services that receives input from the gadget and performs intrusion detection to recognize malicious behavior or content over a network and a lightweight mobile host agent installed on mobile device that performs recovery process in event of failure [13]. High level system architecture is shown in Figure 3. It consists of two major services cloud computing and mobile host agent. The function and sub functions of these two services explained below. 4.1 Cloud Computing Services The major component of this architecture is cloud computing services. In this architecture, emulated device platform as a service and security as a service for intrusion detection and taking proper action against it. Firstly, the target device is registered on the cloud server application that monitors the traffic between device and internet and detects malicious behavior [13]. This application set up following security methods. 243
7.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME Emulator: Emulator is present in the cloud environment and having accurate copy of actual device. It is used to perform runtime analysis on replica of device to detect definite types of zero-days attack such as buffer-overflow and code injection attacks [7], [8], [13] Memory Scanners: It scans the memory of a device that detects a memory resident attack. In such kind of attack malicious components are concealed within memory, which leaves no file to detect for antivirus software [13]. System call anomaly detection: Detection methods based solely on the system calls can even be applied directly to the execution trace, without any need for replaying. As a result, system call detection methods are extremely fast [13]. Antivirus Software: The various effective, efficient and popular open source antiviruses being used to run in the emulator to detect various malicious scripts, signature and definition of viruses, worms, and Trojans [13]. Mobile Host Agent The mobile host agent is a lightweight process that installed in the form of application on the Android device. It inspects file activity on the system and receives a signal from a cloud. It is also provides the access control where each file is trapped and send to a handling routine which begins by generating a unique identifier (such as a hash) of the file, which is compared against a cache of files those are previously analyzed. If a file identifier is not present in the cache, then the file is sent to the in-cloud network service for analysis [13]. After the analysis of file, the results are stored in both a local cache on the mobile host agent and in a shared remote cache in the cloud computing service. Then the files can be accesses by mobile device simply look up the result in the local cache without requiring network access. In addition, access of the same file by other devices can be mediated using a shared remote cache located in the cloud service, without having to send the file for analysis[13]. Cached reports stored in the network service may also opportunistically be pushed to the agent to speed up future accesses. It is also responsible for executing commands required to flash Android Smartphone device into recovery mode [13]. 4.2 5. CONCLUSIONS This paper explains various cloud based intrusion detection services that provides favorable shield to Android Smartphone and mobile host provides optimal recovery procedure. It gives desired configuration by installing several applications at one time. This eases the conformability with the system even for technically unsound users. In this system, proxy server is responsible for duplicating the communication between the Smartphone and the Internet and sending it to the emulator in cloud environment where the intrusion detection and in-depth forensics analyses are performed. The evaluation of a user space implementation of Paranoid Android architecture, shows that transmission overhead can be kept well below 2.5 Kbps even during periods of high activity (browsing, audio playback), and to virtually nothing during idle periods. Battery life is reduced by about 30%, but it can be significantly improved by implementing the tracer within the kernel. It offers more comprehensive security than possible with alternative models. To address the growing concern of mobile device threats, Record and Replay approach can be used in mobile device for malware detection. By moving the detection capabilities to a network service, it increases the detection coverage, less complex mobile software, and reduced resource consumption. This approach shows that it is feasible and effective for the current generation of mobile devices, but will become even more consequential and valuable in the future as the scale and sophistication of mobile threats increases. 244
8.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 4, Issue 6, September – October (2013), © IAEME REFERENCES 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. Stojan Kitanov, Danco Davcev “Mobile Cloud Computing Environment as a Support for Mobile Learning”. In CLOUD COMPUTING : The Third International Conference on Cloud Computing, GRIDs, and Virtualization ,2012, pages 99-105. J. Jamaluddin, N. Zotou, and P. Coulton. “Mobile phone vulnerabilities: a new generation of malware”. In Consumer Electronics, IEEE International Symposium, 2004, pages 199 – 202. Thomas Ruebsamen, Christoph Reich, “Enhancing Mobile Device Security by Security Level Integration in a Cloud Proxy”. In CLOUD COMPUTING : The Third International Conference on Cloud Computing, GRIDs, and Virtualization, 2012, pages 159-168 Hamet Hamad, Mahmoud Al-Hoby, “Managing Intrusion Detection as a Service in Cloud Networks”. In International Journal of Computer Applications, 2012, pages 35-40. Amir Houmansadr, Saman A. Zonouz, and Robin Berthier, “A Cloud-based Intrusion Detection and Response System for Mobile Phones”. In DSN-W, 2012, pages 31-32 Jon Oberheide, Kaushik Veeraraghavan, Evan Cooke, Jason Flinn, Farnam Jahanian, “Virtualized In-Cloud Security Services for Mobile Devices”. In Proceedings of the First Workshop on Virtualization in Mobile Computing, 2008, pages 31–35. Piromsopa, K.; Enbody, R.J. “Buffer Overflow Protection: The Theory”. In Electro/information Technology, IEEE International Conference, 2006, pages 454-458. Zhichun Li; Lanjia Wang; Yan Chen; Zhi Fu, “Network- based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms”. In Network Protocols, 2007, Pages 164 – 173. Georgios Portokalidis Philip Homburg Kostas Anagnostakis, “Paranoid Android: Versatile Protection for Smartphones”. In Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pages 347–356. Yajin Zhou, Xuxian Jiang, “Dissecting Android Malware: Characterization and Evolution”. In DSN Oakland, 2012 A.D. Schmidt, R. Bye, H.-G. Schmidt, J. Clausen, O. Kiraz, K. Yuksel, S. Camtepe, and S. Albayrak, “Static analysis of executables for collaborative malware detection on android,” in Communications, 2009. ICC ’09. IEEE International Conference on, june 2009, pages 1 –5. Bose, X. Hu, K. G. Shin, and T. Park, “Behavioral detection of malware on mobile handsets,” in Proceeding of the 6th international conference on Mobile systems, applications, and services, ser. MobiSys ’08. New York, NY, USA:ACM, 2008, pages 225–238. Rohit S. Khune and J. Thangakumar, “A Cloud-Based Intrusion Detection System for Android Smartphones”, Proceedings of the International Conference on Radar, Communication and Computing (ICRCC 2012), SKP Engineering College, Tiruvannamalai, TN., India. 21 - 22 December, 2012. pp. 268-272. Prof. P.L.Ramteke and Dr.D.N.Chaudhari, “Eclipse & Java Based Modeling Platforms for Smart Phone”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 260 - 266, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Kirandeep and AnuGarg, “Implementing Security on Android Application”, International Journal of Computer Engineering & Technology (IJCET), Volume 4, Issue 2, 2013, pp. 576 - 589, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. Gurudatt Kulkarni, Jayant Gambhir and Amruta Dongare, “Security in CLOUD COMPUTING”, International Journal of Computer Engineering & Technology (IJCET), Volume 3, Issue 1, 2012, pp. 258 - 265, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. G.C.Priya, G.Gayathri and R.Parameswari,, “Monitoring System using Smart Phones”, International Journal of Computer Engineering & Technology (IJCET), Volume 2, Issue 1, 2011, pp. 1 - 8, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. 245
Descargar ahora