Do you want to publish a course? Click here

Analysis and detect malicious software in the operating systems for smart phones Operating System Case Study (Android)

تحليل و كشف البرمجيات الخبيثة في أنظمة التشغيل للهواتف الذكية دراسة حالة نظام التشغيل (أندرويد)

1061   0   27   0 ( 0 )
 Publication date 2017
and research's language is العربية
 Created by Shamra Editor




Ask ChatGPT about the research

In the past few years, smart phones developments than just a simple mobile phones to sophisticated computers. This development has allowed for users of smart phones to surf the Internet, receive and send e-mail, SMS and MMS messages and connect to devices to exchange information. And make all these features of the smartphone useful tool in our daily lives, but the same time, make it more useful to attract malicious applications. Knowing that most users store sensitive information on their mobile phones .smart phones are considered desirable scorer attackers and malware developers .And make the need to preserve the security and confidentiality of the data on the Android platform from malware analysis on it is an urgent issue. This research on previous methods to analyze the dynamic behavior of the applications have been approved and adopted a method to detect malware on the Android platform. It was implication the reagent in the context of assembling the effects of the number of users relied on crowdsourcing. We have been testing our frame analysis of the collected data at the central server using two types of data sets: data from the artificial malware have been created for testing purposes and malware incident of life in the world. It turns out that the method used is an effective way to isolate malware and alert users to software that was downloaded.

References used
GUANGDONG BAI, LIANG GU, TAO FENG, YAO GUO, and XIANGQUN CHEN. Context-aware usage control for android. In Security and Privacy in Communication Networks, volume 50 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,Springer Berlin Heidelberg, 2012. , pages 326–343
WILLIAM ENCK, PETER GILBERT, BYUNG-GON CHUN,LANDON P. COX, JAEYEON JUNG, PATRICK MCDANIEL, and ANMOL N. SHETH. TAINTDROID: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI’10, CA,USA, 2014. , pages 1–6, Berkeley USENIX Association
J. B. MACQUEEN. Some methods for classification and analysis of multivariate observations. In L. M. Le Cam and J. NEYMAN, editors, Proc. of the fifth Berkeley Symposium on Mathematical Statistics and Probability, volume 1, University of California Press, 2013. pages 281–297
rate research

Read More

The employment of multiple antennas at the transmission and reception side for the formation of a MIMO system contributed significantly to improve the reliability of transmission and increase the data rate. In the last decade, this system represent ed the backbone of wireless communications which paved the way for the development of many techniques in this area. Therefore, there is a need to study the most important of these techniques and compare its performance analysis. This research deals with several closed-loop MIMO techniques : (P-OSM) which maximizes the minimum Euclidean distance in the received signal constellation in order to reduce the bit error rate, (X and Y Precoders) which improve the diversity gain of MIMO system. The aim is to study and analysis the performance of previous techniques in practical scenarios of wireless communication systems in the presence of limited feedback channel. The results shows the possibility of practical employment of the P-OSM technique in a simple way compared to other techniques due to its good performance and low complexity order.
The research problem is the lack of urban policies which use smart cities technologies in solving urban problems, especially transportation problems, so the research aims to develop a strategy to solve transportation problems in Damascus using smar t cities applications. It starts by defining smart cities and its dimensions, then shows its basic applications, especially smart transportation, its components, application challenges, and its role in solving transportation problems, then it introduce similar experiments for the application of smart transportation systems, then it concludes to a set of recommendations which contribute to solve traffic problems in Damascus through the application of intelligent transportation strategy.
The consumption of power in the industrial field almost reaches approximately 40% of the total generated power. One kind of useless consumption of power is the losses in the electrical motors starting. The impact of the losing power might be ignore d in the continuous and short time working systems. However, in case of periodic starting up, the losing ratio will be exaggerated. Also, the controlling of starting up process will be considerable and can keep the losses at lowest levels. In this paper, the effect of using the Semi-conductors controlling system in DC motors on power losses was studied and compared with control system using resistors starting in periodic short time systems. The obtained results show that there is a relationship between the power saving in KWh per year as a function of the rated motor power and the number of starting up per Hour. Due to conveying from conventional controlling system to modern control system uses semiconductor rectifier.
We describe our experience with providing automatic simultaneous spoken language translation for an event with human interpreters. We provide a detailed overview of the systems we use, focusing on their interconnection and the issues it brings. We pr esent our tools to monitor the pipeline and a web application to present the results of our SLT pipeline to the end users. Finally, we discuss various challenges we encountered, their possible solutions and we suggest improvements for future deployments.
With the recent advances in the field of network security, a technique called Intrusion Detection System IDS is developed to further enhance and make network secure. It is a way by which we can protect our internal network from outside attack, and can take appropriate action if needed. Using intrusion detection methods, information can be collected from known types of attack and can be used to detect if someone is trying to attack the network. Many techniques are there to detect intrusion in a network like signature matching, anomaly based and others. The work presented here studies and compares the techniques used by intrusion detection systems, and focuses on the signature matching technique. It discusses the open source, free intrusion detection system Snort. Another open source intrusion detection system Bro is also discussed. It compares these systems alarms against the open source tool IDSWakeup.
comments
Fetching comments Fetching comments
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا