Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Muath Alrammal"'
Autor:
Muath Alrammal Muath Alrammal, Munir Naveed Muath Alrammal, Suzan Sallam Munir Naveed, Georgios Tsaramirsis Suzan Sallam
Publikováno v:
網際網路技術學刊. 23:1651-1661
Android has become the dominant operating system for portable devices, making it a valuable asset that needs protection. Though Android is very popular; it has several vulnerabilities which attackers use for malicious intents. In this paper, we prese
Autor:
Fadi Abu-Amara, Muath Alrammal, Hajar Al Hammadi, Salama Alhameli, Inoor Mohamed, Maha Alaydaroos, Zainab Alnuaimi
Publikováno v:
Materials Today: Proceedings. 63:731-736
Publikováno v:
ORCID
Microsoft Academic Graph
Microsoft Academic Graph
The mobile malware is scaling up in terms of numbers and in degree of sophistication. The analysis of mobile malware is challenging for several reasons e.g., mobile apps are context aware and use the device resources which can pose greater risks for
Publikováno v:
Handbook of Computer Programming with Python ISBN: 9781003139010
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::f8bdfd5aba1d1eb5da5869288fbb3f61
https://doi.org/10.1201/9781003139010-10
https://doi.org/10.1201/9781003139010-10
Autor:
Georgios Tsaramirsis, Antreas Kantaros, Izzat Al-Darraji, Dimitrios Piromalis, Charalampos Apostolopoulos, Athanasia Pavlopoulou, Muath Alrammal, Zamhar Ismail, Seyed M. Buhari, Milos Stojmenovic, Hatem Tamimi, Princy Randhawa, Akshet Patel, Fazal Qudus Khan
Every so often, a confluence of novel technologies emerges that radically transforms every aspect of the industry, the global economy, and finally, the way we live. These sharp leaps of human ingenuity are known as industrial revolutions, and we are
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b61c2e96b94da1eb6c23b76e370fbe01
https://avesis.deu.edu.tr/publication/details/e2100058-4580-4efc-a403-c04adae2f0a5/oai
https://avesis.deu.edu.tr/publication/details/e2100058-4580-4efc-a403-c04adae2f0a5/oai
Publikováno v:
Journal of Communications. :735-740
As the number of IoT devices grow rapidly, and soon to exceed 40 billion, security challenges grow rapidly as well. One challenge proven to wreak havoc in the past few years is the use of IoT devices as attacking tools. This paper presents the result
Publikováno v:
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom).
Publikováno v:
Electronics; Volume 10; Issue 22; Pages: 2881
Electronics, Vol 10, Iss 2881, p 2881 (2021)
Electronics, Vol 10, Iss 2881, p 2881 (2021)
The use of innovative and sophisticated malware definitions poses a serious threat to computer-based information systems. Such malware is adaptive to the existing security solutions and often works without detection. Once malware completes its malici
Publikováno v:
Advanced Science Letters. 23:7666-7669
Publikováno v:
IOP Conference Series: Materials Science and Engineering. 946:012003
Malware detection is a challenging and non-trivial task due to ever increase in several attacks and their sophistication level. Detection of such attacks demands the exploration of new approaches to generalize the attack patterns. One such approach i