48
Views
3
CrossRef citations to date
0
Altmetric
Articles

Vulnerability assessment of android instant messaging application and network intrusion detection prevention systems

&

References

  • Hao Zhang, Lei Chen and Qingzhong Liu, “Digital Forensic Analysis of Instant Messaging Applications on Android Smartphones”, International Conference on Computing, Networking and Communications (ICNC), Maui, HI, USA. 2018. DOI:10.1109/ICCNC.2018.8390330
  • Yavuz Canbay, Mehtap Ulker, Seref Sagiroglu. “Detection of mobile applications leaking sensitive data.” 5th International Symposium on Digital Forensic and Security (ISDFS), Tirgu Mures, Romania. May 2017 DOI:10.1109/ISDFS.2017.7916515.
  • Sok-Ian Sou, Chuan-Sheng Lin, “Random Packet Inspection Scheme for Network Intrusion Prevention in LTE Core Networks”, IEEE Transactions on Vehicular Technology, pp 8385-8397, Volume: 66, Issue: 9, Sept 2017, DOI: 10.1109/TVT.2017.2675454.
  • Fan Zhang, Student Hansaka Angel Dias Edirisinghe Kodituwakku, J. Wesley Hines, and Jamie Coble, “Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data”, in IEEE Transactions on Industrial Informatics (Volume: 15, Issue: 7), 2019. DOI: 10.1109/TII.2019.2891261
  • Kebrande Victor R., Nickson M. Karie and H. S. Venter, “A Generic Digital Forensic Readiness Model for BYOD using Honeypot Technology”. IST-Africa 2016 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, jul 2016, DOI:10.1109/TVT.2016.77380824
  • M. Al Fahdi, N.L. Clarke & S.M. Furnell, “Challenges to Digital Forensics” in IEEE conference, Information Security for South Africa, 14-16 Aug. 2013. DOI: 10.1109/ISSA.2013.6641058.
  • I. Ahmad, M. Basheri, M. J. Iqbal and A. Rahim, (2018), “Performance Comparison of Support Vector Machine, Random Forest, and Extreme Learning Machine for Intrusion Detection,” IEEE Access, vol 6, pp 33789-33795. DOI:10.1109/ACCESS.2018.2841987.
  • Moore Scott R. and, Huangyi Ge, Ninghui Li and Robert W. Proctor “Cybersecurity for Android Applications: Permissions in Android 5 and 6”, International Journal of Human–Computer Interaction Vol 35, pp 630-640, 10 Jul 2018, doi.org/10.1080/10447318.2018.1489580
  • Hwan-Taek Lee, Hwan-Taek Lee, Dongjin Kim, Minkyu Park & Seongje Cho, “Protecting data on android platform against privilege escalation attack International Journal of computer mathematics. May 2014. doi.org/10.1080/00207160.2014.986113.
  • The Theory of Planned Behavior and Information Security Policy Compliance Teodor Sommestad, Henrik Karlzén & Jonas Hallbergv, Journal of Computer Information Systems, Volume 59, Pages 344-353, 18 Sep 2017, doi.org/10.1080/08874417.2017.1368421.
  • Ramesh C. Poonia & Manish Kalra (2016) Bridging approaches to reduce the gap between classical and quantum computing, Journal of Information and Optimization Sciences, 37:2, 279-283 doi: 10.1080/02522667.2015.1131024

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.