Open Access
SHS Web Conf.
Volume 144, 2022
2022 International Conference on Science and Technology Ethics and Human Future (STEHF 2022)
Article Number 02014
Number of page(s) 8
Section Mobile Communication Technology and Prospects of Frontier Technology
Published online 26 August 2022
  1. Janis Griffin (2021) What Is an Intrusion Detection System (IDS)? [Google Scholar]
  2. Wang, X., Yu, H. (2005). How to Break MD5 and Other Hash Functions. In: Cramer, R. (eds) Advances in Cryptology – EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol 3494. Springer, Berlin, Heidelberg. [Google Scholar]
  3. Xiaoyun Wang, Hongbo Yu, & Yiqun Lisa Yin (2005). Efficient Collision Search Attacks on SHA-0. In In Crypto (pp. 1–16). Springer-Verlag. [Google Scholar]
  4. Sharfah Ratibah Tuan Mat, Mohd Faizal Ab Razak, Mohd Nizam Mohmad Kahar, Juliza Mohamad Arif, & Ahmad Firdaus (2021). A Bayesian probability model for Android malware detection. ICT Express. [Google Scholar]
  5. APPLE INC. (2021) CSAM Detection Technical Summary. [Google Scholar]
  6. Sakaguchi, K., Duh, K., Post, M., & Van Durme, B.. (2016). Robsut Wrod Reocginiton via semi-Character Recurrent Neural Network. [Google Scholar]
  7. Rong, X.. (2014). word2vec Parameter Learning Explained. [Google Scholar]
  8. Dataset for scam callers recognition and classification [Google Scholar]
  9. Residual Networks (ResNet) – Deep Learning [Google Scholar]
  10. Ashishb. Collection of android malware samples [Google Scholar]
  11. Hurier, M., Suarez-Tangil, G., Dash, S., Bissyandé, T., Le Traon, Y., Klein, J., & Cavallaro, L. (2017). Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware. In 2017 IEEE/ACM 14th International Conference on Mining Software Repositories (MSR) (pp. 425-435). [Google Scholar]
  12. Allix, K., Bissyandé, T., Klein, J., & Le Traon, Y. (2016). AndroZoo: Collecting Millions of Android Apps for the Research Community. In Proceedings of the 13th International Conference on Mining Software Repositories (pp. 468–471). ACM. [Google Scholar]
  13. Apache Software Foundation. (2021) Apache SpamAssassin Spam Filter [Google Scholar]
  14. Kaddoura S, Chandrasekaran G, Elena Popescu D, Duraisamy JH. A systematic literature review on spam content detection and classification. PeerJ. Computer Science. 2022; 8: e830. DOI: 10.7717/peerj-cs.830. PMID: 35174265; PMCID: PMC8802784. [CrossRef] [Google Scholar]
  15. LianYing Min, & TingTing Zhao (2006). Research and improvements on pattern matching algorithms. Computers and Modernizations (8), 4. [Google Scholar]
  16. Mike Fisk, & George Varghese (2001). Fast ContentBased Packet Handling for Intrusion Detection [White paper]. [Google Scholar]
  17. Feng, B., Fu, Q., Dong, M., Guo, D., & Li, Q. (2018). Multistage and Elastic Spam Detection in Mobile Social Networks through Deep Learning. IEEE Network, 32(4), 15-21. [CrossRef] [Google Scholar]
  18. Damopoulos, D., Menesidou, S., Kambourakis, G., Papadaki, M., Clarke, N., & Gritzalis, S. (2012). Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Security and Communication Networks, 5, 3-14. [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.