A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks.
S. Abijah RoselineS. GeethaPublished in: Comput. Electr. Eng. (2021)
Keyphrases
- detect malicious
- mobile devices
- mobile phone
- software tools
- communication technologies
- malicious code
- mobile users
- computer programs
- detecting malicious
- data mining
- mobile computing
- attack scenarios
- denial of service attacks
- personal digital assistants
- traffic analysis
- malware detection
- reverse engineering
- countermeasures
- mobile networks
- risk management
- mobile applications
- learning scenarios
- software systems
- anomaly detection
- context aware
- computer systems
- web applications
- database systems