首页 > 最新文献

Discover Internet of Things最新文献

英文 中文
Determining critical nodes in optimal cost attacks on networked infrastructures 确定网络基础设施最佳成本攻击中的关键节点
Pub Date : 2024-01-18 DOI: 10.1007/s43926-023-00054-1
Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved
{"title":"Determining critical nodes in optimal cost attacks on networked infrastructures","authors":"Ishfaq Ahmad, Addison Clark, Muhammad Ali, Hansheng Lei, David Ferris, Alex Aved","doi":"10.1007/s43926-023-00054-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00054-1","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139614816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques 利用机器学习技术对使用 MFCC 和 STFT 特征进行音频分类的比较分析
Pub Date : 2024-01-03 DOI: 10.1007/s43926-023-00049-y
Mahendra Kumar Gourisaria, Rakshit Agrawal, Manoj Sahni, Pradeep Kumar Singh
{"title":"Comparative analysis of audio classification with MFCC and STFT features using machine learning techniques","authors":"Mahendra Kumar Gourisaria, Rakshit Agrawal, Manoj Sahni, Pradeep Kumar Singh","doi":"10.1007/s43926-023-00049-y","DOIUrl":"https://doi.org/10.1007/s43926-023-00049-y","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative image interpolation based reversible data hiding for secure communication 基于图像插值的创新型可逆数据隐藏技术,用于安全通信
Pub Date : 2023-12-01 DOI: 10.1007/s43926-023-00050-5
Riya Punia, Aruna Malik, Samayveer Singh
{"title":"Innovative image interpolation based reversible data hiding for secure communication","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00050-5","DOIUrl":"https://doi.org/10.1007/s43926-023-00050-5","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138624760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP 迭代特征选择技术是否足够高效?使用 SHAP 进行勒索软件分类时 RFECV 特征选择技术的性能比较分析
Pub Date : 2023-11-30 DOI: 10.1007/s43926-023-00053-2
Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy
{"title":"Is iterative feature selection technique efficient enough? A comparative performance analysis of RFECV feature selection technique in ransomware classification using SHAP","authors":"Rawshan Ara Mowri, Madhuri Siddula, Kaushik Roy","doi":"10.1007/s43926-023-00053-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00053-2","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139198677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples 使用数据驱动法对物联网进行全面的生命周期评估和有效的生态设计:以基于 LoRa 的物联网系统为例
Pub Date : 2023-11-20 DOI: 10.1007/s43926-023-00051-4
Ernesto Quisbert-Trujillo, Panagiota Morfouli
{"title":"Using a data driven approach for comprehensive Life Cycle Assessment and effective eco design of the Internet of Things: taking LoRa-based IoT systems as examples","authors":"Ernesto Quisbert-Trujillo, Panagiota Morfouli","doi":"10.1007/s43926-023-00051-4","DOIUrl":"https://doi.org/10.1007/s43926-023-00051-4","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139258457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania 基于物联网(IoT)的锅炉燃料实时远程监控系统:坦桑尼亚阿鲁沙拉哈饮料有限公司的案例
Pub Date : 2023-11-20 DOI: 10.1007/s43926-023-00052-3
Boniface Ntambara, D. Nyambo, Andreas Solsbach
{"title":"Internet of things (IoT)-based on real-time and remote boiler fuel monitoring system: a case of Raha Beverages Company Limited, Arusha-Tanzania","authors":"Boniface Ntambara, D. Nyambo, Andreas Solsbach","doi":"10.1007/s43926-023-00052-3","DOIUrl":"https://doi.org/10.1007/s43926-023-00052-3","url":null,"abstract":"","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139255642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An interpolation-based reversible data hiding scheme for internet of things applications 物联网应用中基于插值的可逆数据隐藏方案
Pub Date : 2023-11-09 DOI: 10.1007/s43926-023-00048-z
Riya Punia, Aruna Malik, Samayveer Singh
Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. Therefore, the maximum amount of data that could be stored in the image media is a difficult challenge while maintaining the image quality. Thus, to make the balance between the quality of the images and the embedding capacity, a novel interpolation-based revisable data hiding (RDH) approach is developed for IoT applications. The proposed interpolation technique takes the average of the root value for the product of two neighboring original pixel values and the third original pixel value. And for the central pixel, it takes an average of two interpolated pixels. By doing so, most of the original pixels are considered and the calculated interpolated pixel is much enhanced as its average value. Furthermore, the data hiding is performed in two stages. In the first stage, RSA is performed on the secret message, and then embedding is done based on which intensity range group. The experimental results indicate that the proposed technique enhanced the embedding capacity by 17.58% and produced 7.80% higher PSNR values for the test images as compared to the baseline methods.
物联网(IoT)的指数级增长导致对安全高效的数据传输方法的需求增加。然而,在数据隐藏方法中存在图像质量和隐藏能力的折衷。因此,在保持图像质量的同时,最大限度地存储在图像介质中的数据量是一项艰巨的挑战。因此,为了在图像质量和嵌入容量之间取得平衡,为物联网应用开发了一种新的基于插值的可修正数据隐藏(RDH)方法。所提出的插值方法取相邻两个原始像素值和第三个原始像素值乘积的根值的平均值。对于中心像素,它取两个插值像素的平均值。通过这样做,考虑了大部分原始像素,并且计算出的插值像素的平均值得到了很大的增强。此外,数据隐藏分两个阶段进行。首先对秘密消息进行RSA,然后根据强度范围组进行嵌入。实验结果表明,与基线方法相比,该方法的嵌入能力提高了17.58%,测试图像的PSNR值提高了7.80%。
{"title":"An interpolation-based reversible data hiding scheme for internet of things applications","authors":"Riya Punia, Aruna Malik, Samayveer Singh","doi":"10.1007/s43926-023-00048-z","DOIUrl":"https://doi.org/10.1007/s43926-023-00048-z","url":null,"abstract":"Abstract The exponential growth of the Internet of Things (IoT) has led to an increased demand for secure and efficient data transmission methods. However, there is a tradeoff in the image quality and hiding capacity in the data hiding methods. Therefore, the maximum amount of data that could be stored in the image media is a difficult challenge while maintaining the image quality. Thus, to make the balance between the quality of the images and the embedding capacity, a novel interpolation-based revisable data hiding (RDH) approach is developed for IoT applications. The proposed interpolation technique takes the average of the root value for the product of two neighboring original pixel values and the third original pixel value. And for the central pixel, it takes an average of two interpolated pixels. By doing so, most of the original pixels are considered and the calculated interpolated pixel is much enhanced as its average value. Furthermore, the data hiding is performed in two stages. In the first stage, RSA is performed on the secret message, and then embedding is done based on which intensity range group. The experimental results indicate that the proposed technique enhanced the embedding capacity by 17.58% and produced 7.80% higher PSNR values for the test images as compared to the baseline methods.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135240927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks 物联网研究综述嵌入式设备固件安全性:体系结构、提取技术和漏洞分析框架
Pub Date : 2023-10-31 DOI: 10.1007/s43926-023-00045-2
Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta
Abstract IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber world is the security of these devices. One of the main reasons that these devices are active targets for large-scale cyber-attacks is a lack of security standards and thorough testing by manufacturers. Manufacturer-specific operating systems or firmware of various architectures and characteristics are typically included with these devices. However, due to a lack of security testing and/or late patching, the underlying firmware or operating systems are vulnerable to numerous types of vulnerabilities. Reverse engineering and in-depth research of the firmware is required to detect the vulnerabilities. In this paper, we've delved into various aspects of IoT and embedded devices. This includes a comprehensive survey on the architecture of firmware, techniques for firmware extraction, and state-of-the-art vulnerability analysis frameworks for the detection of vulnerabilities using various approaches like static, dynamic, and hybrid approaches. Furthermore, we’ve scrutinized the challenges of existing vulnerability analysis frameworks and proposed a novel framework to address these issues.
物联网和嵌入式设备以指数级速度增长,然而,没有适当的安全机制。网络世界的主要挑战之一是这些设备的安全性。这些设备成为大规模网络攻击目标的主要原因之一是缺乏安全标准和制造商的彻底测试。这些设备通常包含特定于制造商的操作系统或各种体系结构和特性的固件。然而,由于缺乏安全测试和/或后期补丁,底层固件或操作系统容易受到多种类型漏洞的攻击。需要对固件进行逆向工程和深入研究才能发现漏洞。在本文中,我们深入研究了物联网和嵌入式设备的各个方面。这包括对固件架构的全面调查,固件提取技术,以及使用各种方法(如静态,动态和混合方法)检测漏洞的最新漏洞分析框架。此外,我们仔细研究了现有漏洞分析框架的挑战,并提出了一个新的框架来解决这些问题。
{"title":"A survey on IoT & embedded device firmware security: architecture, extraction techniques, and vulnerability analysis frameworks","authors":"Shahid Ul Haq, Yashwant Singh, Amit Sharma, Rahul Gupta, Dipak Gupta","doi":"10.1007/s43926-023-00045-2","DOIUrl":"https://doi.org/10.1007/s43926-023-00045-2","url":null,"abstract":"Abstract IoT and Embedded devices grow at an exponential rate, however, without adequate security mechanisms in place. One of the key challenges in the cyber world is the security of these devices. One of the main reasons that these devices are active targets for large-scale cyber-attacks is a lack of security standards and thorough testing by manufacturers. Manufacturer-specific operating systems or firmware of various architectures and characteristics are typically included with these devices. However, due to a lack of security testing and/or late patching, the underlying firmware or operating systems are vulnerable to numerous types of vulnerabilities. Reverse engineering and in-depth research of the firmware is required to detect the vulnerabilities. In this paper, we've delved into various aspects of IoT and embedded devices. This includes a comprehensive survey on the architecture of firmware, techniques for firmware extraction, and state-of-the-art vulnerability analysis frameworks for the detection of vulnerabilities using various approaches like static, dynamic, and hybrid approaches. Furthermore, we’ve scrutinized the challenges of existing vulnerability analysis frameworks and proposed a novel framework to address these issues.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135809205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces 物联网时代的连接:关于可重构智能表面的安全性、特性和限制因素
Pub Date : 2023-10-19 DOI: 10.1007/s43926-023-00046-1
Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten
Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).
(工业)物联网(IoT)的关键驱动力是什么?除了各种设备、传感器和执行器的互连外,最重要的是收集和传输的数据,(I)物联网本身是各种类型数据的来源和接受者。其中,有两个主要方面需要考虑:(i)具有适当延迟和可靠性要求的数据传输,以及(ii)数据的保护。在第六代(6G)无线系统的开发过程中,这两种要求都被考虑在内。这种设计旨在提供更高的数据速率、更低的部署成本和更高的可靠性,同时提供通用连接。因此,为了支持如此庞大的网络域,开发了(新的)支持6g的技术,其中包括能够修改和重新配置无线传播通道的可重构智能表面(RISs)。这项工作描述了RISs如何支持安全性,特别是物理层安全性(PhySec)方法的概念。此外,提出了一种有效的阻抗面模型,可以有效地模拟RISs的分束和整形特性。最后,提到了用例的适用性,特别关注可见光通信(VLC)。
{"title":"Connectivity in the era of the (I)IoT: about security, features and limiting factors of reconfigurable intelligent surfaces","authors":"Christoph Lipps, Jan Herbst, Steffen Klingel, Lars Franke, Alexander Wolff, Matthias Rüb, Rekha Reddy, Marco Rahm, Hans Dieter Schotten","doi":"10.1007/s43926-023-00046-1","DOIUrl":"https://doi.org/10.1007/s43926-023-00046-1","url":null,"abstract":"Abstract What are the key drivers of the (Industrial) Internet of Things ((I)IoT)? Alongside the interconnection of the various devices, sensors, and actuators, it is above all the data collected and transmitted that is of particular significance, the (I)IoT itself is the source and recipient of various types of data. Within this, there are two main aspects that need to be considered: (i) the transmission of data with appropriate latency and reliability requirements, and (ii) the safeguarding of this data. Both requirements are taken into account during the development of the Sixth Generation (6G) Wireless Systems. This is conceived to deliver higher data rates, reduced cost deployment, and enhanced reliability while providing universal connectivity. Hence, to assist such a vast network domain, (new) 6G-enabling technologies are developed, which include Reconfigurable Intelligent Surfaces (RISs), that are capable of modifying and reconfiguring the wireless propagation channels. This work describes concepts on how security, in particular Physical Layer Security (PhySec) methods, can be supported by RISs. Furthermore, an effective impedance surface model is presented, allowing efficient simulation of beamsplitting and shaping properties of RISs. Finally, the applicability of the use cases is mentioned, with a particular focus on Visible Light Communication (VLC).","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135779421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification and security assessment of android apps android应用分类及安全评估
Pub Date : 2023-10-16 DOI: 10.1007/s43926-023-00047-0
Eralda Caushaj, Vijayan Sugumaran
Abstract Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.
当前的移动平台给用户带来了诸多隐私风险。Android应用程序(app)请求访问设备资源和数据,如存储、GPS位置、摄像头、麦克风、短信、电话身份和网络信息。合法的移动应用程序、广告和恶意软件都需要访问移动资源和数据才能正常运行。因此,用户很难做出明智的决定,有效地平衡他们的隐私和应用程序的功能。本研究分析了Android应用程序权限、广告网络及其对终端用户隐私的影响。应用权限和广告网络的危险组合被用作我们预测模型的特征,以理解应用的行为。考虑到现实生活中良性和恶意应用之间的不平衡,我们的模型具有95.9%的高分类准确率。我们假设某些应用程序权限可能对最终用户的隐私构成潜在威胁,这被证实是我们预测模型中最具影响力的特征之一。由于我们的研究考虑了广告网络和恶意软件权限的影响,它将帮助最终用户对他们授予的应用权限做出更明智的决定,并了解应用权限为更多漏洞打开了大门,在某种程度上,良性应用可能会表现出恶意行为。
{"title":"Classification and security assessment of android apps","authors":"Eralda Caushaj, Vijayan Sugumaran","doi":"10.1007/s43926-023-00047-0","DOIUrl":"https://doi.org/10.1007/s43926-023-00047-0","url":null,"abstract":"Abstract Current mobile platforms pose many privacy risks for the users. Android applications (apps) request access to device resources and data, such as storage, GPS location, camera, microphone, SMS, phone identity, and network information. Legitimate mobile apps, advertisements (ads), and malware all require access to mobile resources and data to function properly. Therefore, it is difficult for the user to make informed decisions that effectively balance their privacy and app functionality. This study analyzes the Android application permissions, ad networks and the impact on end-user’s privacy. Dangerous combinations of app permissions, and ad networks are used as features in our prediction models to understand the behavior of apps. Our models have a high classification accuracy of 95.9% considering the imbalance in real life between benign and malicious apps. Our assumption that certain app permissions can be a potential threat to the privacy of end users is confirmed to be one of the most impactful features of our prediction models. Since our study considers the impact of ad networks and malware permissions, it will help end-users make more informed decision about the app permissions they grant and understand that the app permissions open doors to more vulnerabilities, and at some point, benign apps can behave maliciously.","PeriodicalId":34751,"journal":{"name":"Discover Internet of Things","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136112464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Discover Internet of Things
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1