An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected devices or things such as Android devices, and devices that have more computational capabilities (e.g., storage capacities) are likely to be targeted by ransomware authors. In this paper, we present a machine learning based approach to detect ransomware attacks by monitoring power consumption of Android devices. Specifically, our proposed method monitors the energy consumption patterns of different processes to classify ransomware from non-malicious applications. We then demonstrate that our proposed approach outperforms K-Nearest Neighbors, Neural Networks, Support Vector Machine and Random Forest, in terms of accuracy rate, recall rate, preci...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
Internet of things (IoT) devices communicate, collect and exchange data about our online activities ...
Effective detection of ransomware is becoming increasingly important due to the influx of smartphone...
Abstract—Effective detection of ransomware is becoming increasingly important due to the influx of s...
This paper investigates the feasibility of constructing power-consumption-based sensors for the iden...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
Recently, Smart Home Systems (SHSs) have gained enormous popularity with the rapid development of th...
Embedded devices are increasingly connected to the Internet to provide new and innovative applicatio...
The central promise of the Internet of Things (IoT) is to accelerate the interaction with surroundin...
While the IoT offers important benefits and opportunities for users, the technology raises various s...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
An Internet of Things (IoT) architecture generally consists of a wide range of Internet-connected de...
Internet of things (IoT) devices communicate, collect and exchange data about our online activities ...
Effective detection of ransomware is becoming increasingly important due to the influx of smartphone...
Abstract—Effective detection of ransomware is becoming increasingly important due to the influx of s...
This paper investigates the feasibility of constructing power-consumption-based sensors for the iden...
Abstract—Smartphones and related mobile end-user devices rep-resent key components of mobile computi...
Recently, Smart Home Systems (SHSs) have gained enormous popularity with the rapid development of th...
Embedded devices are increasingly connected to the Internet to provide new and innovative applicatio...
The central promise of the Internet of Things (IoT) is to accelerate the interaction with surroundin...
While the IoT offers important benefits and opportunities for users, the technology raises various s...
Many security problems in smartphones and other smart devices are ap-proached from an anomaly detect...
Mobile malware are malicious programs that target mobile devices. They are an increasing problem, as...
In order to solve the problem that Android platform’s sand-box mechanism prevents security protectio...