How to Block the Malicious Access to Android External Storage.
Sisi YuanYuewu WangPingjian WangLingguang LeiQuan ZhouJun LiPublished in: ICISC (2018)
Keyphrases
- random access
- storage devices
- storage management
- dynamic allocation
- read write
- disk storage
- mobile devices
- access control
- data storage
- external data
- secondary storage
- access paths
- neural network
- fully functional
- remote access
- malware detection
- smart phones
- database
- storage systems
- storage and retrieval
- hard disk
- file system
- malicious users
- remote server
- digital libraries
- detect malicious