The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2021
DOI: 10.1007/978-981-15-9647-6_79
|View full text |Cite
|
Sign up to set email alerts
|

Host Platform Security and Mobile Agent Classification: A Systematic Study

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(6 citation statements)
references
References 26 publications
0
6
0
Order By: Relevance
“…Smart devices are the controlling devices or the devices which give instruction and other devices are the slave devices that perform tasks that are to be instructed or programmed by the controlling module. This system requires that all the devices are to be connected to the cloud all the time for remote access of the system and to synchronize the devices so the functionality should not be compromised [46][47][48]. It has features like notification of urgent calls and messages over laptop or web application if a smartphone is not in reach or the music is loud and your ringtone or notification tone is not audible, etc.…”
Section: Proposed Modelmentioning
confidence: 99%
“…Smart devices are the controlling devices or the devices which give instruction and other devices are the slave devices that perform tasks that are to be instructed or programmed by the controlling module. This system requires that all the devices are to be connected to the cloud all the time for remote access of the system and to synchronize the devices so the functionality should not be compromised [46][47][48]. It has features like notification of urgent calls and messages over laptop or web application if a smartphone is not in reach or the music is loud and your ringtone or notification tone is not audible, etc.…”
Section: Proposed Modelmentioning
confidence: 99%
“…There is no such thing as "THE CLOUD", it's just somebody else's computer. Cloud computing is also called ondemand computing and it is a kind of web-based processing, where participating resources and data are rendered to workstations and different gadgets according to demand [1,2]. Cloud computing is essentially intended to give the most extreme limit from the least resources [3,4].…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, MA security aims to protect MA against malicious hosts that may attack the MA integrity. In addition, malicious hosts may prevent MAs to continue their journeys (Capturing) [15]. Two main approaches to deal with MA security issues: detection or prevention approaches.…”
Section: Introductionmentioning
confidence: 99%