103
Views
6
CrossRef citations to date
0
Altmetric
Articles

Review of cyber security threats and proposed trustworthy memory acquisition mechanism

&

References

  • Arslan Bilgehan, Sedef Gunduz and Seref Sagiroglu, “ A Review on Mobile Threats and Machine Learning Based Detection Approaches”. 4th international symposium on digital forensic and security (ISDFS). 25-27 April 2016, DOI: 10.1109/ISDFS.2016.7473509.
  • Raji Majeed, Hayden wimmer and Rami j. haddad, “Analysing Data from an Android Smartphone while Comparing between Two Forensic Tools”. IEEE Southeast Conference, 19-22 April 2018, DOI 10.1109/ SECON.2018.8478851.
  • Barmpatsalou Konstantia, Tiago Cruz and Edmundo Monteiro, “Mobile Forensic Data Analysis: Suspicious Pattern Detection in Mobile Evidence”. IEEE ACCESS JOURNAL, Vol.4, 15 Octuber 2018 DOI 10.1109/ACCESS.2018.2875068.
  • Fahdi M. Al, N.L. Clarke and S.M. Furnell, “Challenges to Digital Forensics”. Information Security for South Africa IEEE, 14-16 Aug. 2013. DOI 10.1109/ISSA.2013.6641058.
  • Varol Nurhayat, Ahmet Furkan Aydoğan and Asaf Varol, “Cyber Attacks Targeting Android Cellphones”. 5th International Symposium on Digital Forensic and Security (ISDFS) IEEE, 26-28 April 2017. DOI 10.1109/ISDFS.2017.7916511.
  • Vyas Abhilasha and usha batra, “Bot detection by monitoring and grouping domain name server record response queries in DNS traffic”. Journal of Information and Optimization Sciences. Vol. 23. pp1143–1153 ,23 Augest 2019, DOI:10.1080/02522667.2019.1639945.
  • Kaur, Gurdip, Renu Dhir, and Maninder Singh. “A stress testing web-based framework for automated malware analysis.” Journal of Information and Optimization Sciences 38.6 (2017): 937-944, DOI: 10.1080/02522667.2017.1372139
  • Poonia, Ramesh C., and Linesh Raja. “On-Demand Routing Protocols for Vehicular Cloud Computing.” Vehicular Cloud Computing for Traffic Management and Systems. IGI Global, 2018. 151-177, DOI: 10.4018/978-1-5225-3981-0.ch007
  • He Daojing, Sammy Chan and Mohsen Guizani, “Mobile Application Security: Malware Threats and Defenses”. IEEE Wireless Communications IEEE, Volume: 22, Issue: 1, February 2015, pp. 138–144. DOI 10.1109/MWC.2015.7054729.
  • Wang Yong and Yazan Alshboul, “ Mobile Security Testing Approaches and Challenges”.First Conference on Mobile and Secure Services IEEE2015, 02 April2015, DOI:10.1109/MOBISECSERV.2015.7072880.
  • He Sun, Kun Sun, Yuewu Wang and Jiwu Jing, “Reliable and Trustworthy Memory Acquisition onSmartphones”, IEEE Symposium on Security and Privacy.Feb 2015, pp.202-2018, https://doi.org/10.1007/978-3-319-11203-9_12.
  • Sornsuwit Ployphan and Saichon Jaiyen. “A New Hybrid Machine Learning for Cyber security Threat Detection Based on Adaptive Boosting”. Applied Artificial Intelligence An International Journal, pp 462-482, 01 Mar 2019, DOI: 10.1080/08839514.2019.1582861

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.