The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we propose An Android Behavior-Based Malware Detection Method using Machine Learning. We improve an Android application sandbox, Droidbox, by inserting a view-identification automatic trigger program which can click mobile applications in the meaningful order. Taking advantage of Droidbox result, we collect the behavior such as network activities, file read/write and permission as the...
Aiming at the problems of high access rejection probability and low resource usage ratio of traditional access control algorithms for mobile converged networks, a distributed shared resource allocation model is proposed. The features of multiple access networks resource allocation and quality of service (QoS) level are also discussed. A variable resource allocation access control algorithm (VRAACA)...
Mobile platforms such as smart-phones and tablet computers have attained the technological capacity to perform tasks beyond their intended purposes. The steady increase of processing power has enticed researchers to attempt increasingly challenging tasks on mobile devices with appropriate modifications over their stationary counterparts. In this work we present a novel multi-frame object detection...
In a mobile pay-TV system, a large number of messages are exchanged for mutual authentication purposes. In traditional authentication schemes, with one-to-one delivery, one authentication message per request is delivered from a head end system to subscribers. This results in the delivery of a large quantity of messages and therefore is inefficient and costly. Moreover, since most traditional schemes...
With the rapid development of wireless communication, mobile users are able to manually switch their network interfaces to different types of networks. The IEEE 802.21 Draft Standard was proposed to integrate the Media Independent Handover (MIHs) between the wireless network interfaces, such as WiFi, WiMAX, 3 GPP, and 3GPP2. However, it may not hold the seamless roaming character and does not provide...
Mobile WiMAX is the next generation of broadband wireless network. It allows users to roam over the network under vehicular speeds. However, when a mobile station changes from one base station to another, it should be authenticated again. This may lead to delay in communication, especially for real-time applications, such as VoIP and Pay-TV systems. In this paper, we propose two efficient schemes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.