R Eview on M Obile T Hreats and D Etection T Echniques
نویسنده
چکیده
Since last-decade, smart-phones have gained widespread usage. Mobile devices store personal details such as contacts and text messages. Due to this extensive growth, smart-phones are attracted towards cyber-criminals. In this research work, we have done a systematic review of the terms related to malware detection algorithms and have also summarized behavioral description of some known mobile malwares in tabular form. After careful solicitation of all the possible methods and algorithms for detection of mobile-based malwares, we give some recommendations for designing future malware detection algorithm by considering computational complexity and detection ration of mobile malwares.
منابع مشابه
Amitraz Poisoning; A case study
A m i t r a z, a n i ns e c t i c i d e /a ca ri c i de of the f o r m a m i d i n e p e st i c i d e s group, is a ? 2 a d r e n e r g i c ag on i st a nd of t he a m i d i ne c h e m i ca l f a m il y generally us e d to c o n t r ol animal e c top a r a s i t e s. Poisoning due to am i t r a z i s r a r e and character...
متن کاملOn natural homomorphisms of local cohomology modules
Let $M$ be a non-zero finitely generated module over a commutative Noetherian local ring $(R,mathfrak{m})$ with $dim_R(M)=t$. Let $I$ be an ideal of $R$ with $grade(I,M)=c$. In this article we will investigate several natural homomorphisms of local cohomology modules. The main purpose of this article is to investigate when the natural homomorphisms $gamma: Tor^{R}_c(k,H^c_I(M))to kotim...
متن کاملOn the Associated Primes of the generalized $d$-Local Cohomology Modules
The first part of the paper is concerned to relationship between the sets of associated primes of the generalized $d$-local cohomology modules and the ordinary generalized local cohomology modules. Assume that $R$ is a commutative Noetherian local ring, $M$ and $N$ are finitely generated $R$-modules and $d, t$ are two integers. We prove that $Ass H^t_d(M,N)=bigcup_{Iin Phi} Ass H^t_I(M,N)...
متن کاملSoft Com Review G Metho Recent A
1 A o c u to in a T I s e o w I s w m r th T u s r th p d a S Warranty problem n worldwide. A solving warranty However, the ap eceive less con eview of recen warranty problem echniques are c ANN), Fuzzy L eveals that FL w 1. Introduct Almost everyt organization w contractual agr upon the sale o o repair or re ntended. Frequ as a marketing Thus, warranty n the last ten y studied by rese economic...
متن کاملMotion of Particles under Pseudo-Deformation
In this short article, we observe that the path of particle of mass $m$ moving along $mathbf{r}= mathbf{r}(t)$ under pseudo-force $mathbf{A}(t)$, $t$ denotes the time, is given by $mathbf{r}_d= int(frac{dmathbf{r}}{dt} mathbf{A}(t)) dt +mathbf{c}$. We also observe that the effective force $mathbf{F}_e$ on that particle due to pseudo-force $mathbf{A}(t)$, is given by $ mathbf{F}_e= mathbf{F} mat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014