Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
Published 2018 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
Root Exploit Detection and Features Optimization: Mobile Device and Blockchain Based Medical Data Management
Authors
Keywords
Blockchain, Root exploit, Static analysis, Android, Machine learning
Journal
JOURNAL OF MEDICAL SYSTEMS
Volume 42, Issue 6, Pages -
Publisher
Springer Nature
Online
2018-05-04
DOI
10.1007/s10916-018-0966-x
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- Heart-Beats Based Biometric Random Binary Sequences Generation to Secure Wireless Body Sensor Networks
- (2018) Sandeep Pirbhulal et al. IEEE TRANSACTIONS ON BIOMEDICAL ENGINEERING
- Data exfiltration: A review of external attack vectors and countermeasures
- (2018) Faheem Ullah et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Bagging–boosting-based semi-supervised multi-hashing with query-adaptive re-ranking
- (2018) Wing W.Y. Ng et al. NEUROCOMPUTING
- Cost Effective Network Flow Measurement for Software Defined Networks: A Distributed Controller Scenario
- (2018) Hamid Tahaei et al. IEEE Access
- The Blockchain as a Decentralized Security Framework [Future Directions]
- (2018) Deepak Puthal et al. IEEE Consumer Electronics Magazine
- Benefits of an Android Based Tablet Application in Primary Screening for Eye Diseases in a Rural Population, India
- (2017) Sayed Ahmed Imtiaz et al. JOURNAL OF MEDICAL SYSTEMS
- Cerberus, an Access Control Scheme for Enforcing Least Privilege in Patient Cohort Study Platforms
- (2017) Pierre Parrend et al. JOURNAL OF MEDICAL SYSTEMS
- Malicious accounts: Dark of the social networks
- (2017) Kayode Sakariyah Adewole et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Identifying False Alarm for Network Intrusion Detection System Using Hybrid Data Mining and Decision Tree
- (2017) Nor Badrul Anuar et al. Malaysian Journal of Computer Science
- The rise of “malware”: Bibliometric analysis of malware study
- (2016) Mohd Faizal Ab Razak et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- DyHAP: Dynamic Hybrid ANFIS-PSO Approach for Predicting Mobile Malware
- (2016) Firdaus Afifi et al. PLoS One
- Screening smartphone applications using malware family signatures
- (2015) Jehyun Lee et al. COMPUTERS & SECURITY
- A review on feature selection in mobile malware detection
- (2015) Ali Feizollah et al. Digital Investigation
- APK Auditor: Permission-based Android malware detection system
- (2015) Kabakus Abdullah Talha et al. Digital Investigation
- High accuracy android malware detection using ensemble learning
- (2015) Suleiman Y. Yerima et al. IET Information Security
- Android based malware detection using a multifeature collaborative decision fusion approach
- (2015) Shina Sheen et al. NEUROCOMPUTING
- An Efficient Biometric-Based Algorithm Using Heart Rate Variability for Securing Body Sensor Networks
- (2015) Sandeep Pirbhulal et al. SENSORS
- Mobile malware detection through analysis of deviations in application network behavior
- (2014) A. Shabtai et al. COMPUTERS & SECURITY
- Routing protocol design for secure WSN: Review and open research issues
- (2014) Shazana Md Zin et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Evaluation of machine learning classifiers for mobile malware detection
- (2014) Fairuz Amalina Narudin et al. SOFT COMPUTING
- Identifying android malicious repackaged applications by thread-grained system call sequences
- (2013) Ying-Dar Lin et al. COMPUTERS & SECURITY
- MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID
- (2013) Borja Sanz et al. CYBERNETICS AND SYSTEMS
- Analysis of Bayesian classification-based approaches for Android malware detection
- (2013) Suleiman Y. Yerima et al. IET Information Security
- Detecting mobile malware threats to homeland security through static analysis
- (2013) Seung-Hyun Seo et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Forensic carving of network packets and associated data structures
- (2011) Robert Beverly et al. Digital Investigation
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreAdd your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload Now