2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH) 2016
DOI: 10.1109/iciccs.2016.7542341
|View full text |Cite
|
Sign up to set email alerts
|

Emerging threats in mobile communication system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(8 citation statements)
references
References 0 publications
0
7
0
Order By: Relevance
“…Cyber intrusions are evolving exponentially as computer systems advance [22], [34]. The articles [22] [23] [35] all observed a consistent rise of threats and vulnerabilities that are constantly challenging the updated computers, mobile phones, and other products. Specifically, [23] stated that threats faced today go beyond the well-recognized email spam, and have advanced to more complex threats such as botnets, or ransomware.…”
Section: Surveys On Emerging Threatsmentioning
confidence: 99%
See 1 more Smart Citation
“…Cyber intrusions are evolving exponentially as computer systems advance [22], [34]. The articles [22] [23] [35] all observed a consistent rise of threats and vulnerabilities that are constantly challenging the updated computers, mobile phones, and other products. Specifically, [23] stated that threats faced today go beyond the well-recognized email spam, and have advanced to more complex threats such as botnets, or ransomware.…”
Section: Surveys On Emerging Threatsmentioning
confidence: 99%
“…Attackers have also been observed to still be using older, simple tools for intrusion as well as the modern, advanced threats, so security professionals require a more diverse and tiered knowledge on how to approach the potential threats [23]. The article [35] highlighted that some threats are so discreet that many times they are not recognized until they have fully infiltrated the target network.…”
Section: Surveys On Emerging Threatsmentioning
confidence: 99%
“…Outdated or unpatched third-party applications in mobile devices poses risks as hackers may exploit the vulnerabilities within those applications. Users that are still using an old mobile device that has a lack of software updates, an untimely patch update or a cease in support for older operating systems are at risk of being compromised by hackers through the holes within the software or the OS itself [4,6,7]. Additionally, there are various application-based threats which consist of (a) Malware, (b) Spyware, (c) Privacy threats and (d) Vulnerable applications.…”
Section: Definition Of a Mobile Devicementioning
confidence: 99%
“…The mobile device will display an image of a malicious system that is trying to install a harmful software or attempting for data extraction. Further added that mobile devices could be misused by attackers in several ways such as creating a fake identity by using the personal information contained inside the mobile device or by selling sensitive or confidential data to the black-market for profit motives [7,8].…”
Section: Definition Of a Mobile Devicementioning
confidence: 99%
“…The LVC network initially classifies known malware sites XML API calls as it uses supervised learning, which in turn identifies patterns related to further training in order to identify unknown clusters as malicious or benign information [6]. After training, the LVQ can recognize an unidentified pattern in different classes (webpages) that will help the antimalware detector determine the pattern from each pool of webpages XML API Call requests [5].The Euclidean separation was used to evaluate the inter-and intra-callduration of each webpage XML requests yield unit. D ( j ) = ∑ 〖(xi-wij)^2〗…”
Section: Delineation Of Supervised Deep Learning Vector Quantization To Detect Iotmalwareirmentioning
confidence: 99%