BEHAVIORAL MODEL FOR LIVE DETECTION OF APPS BASED ATTACK
Keywords:
Security risk, Control assaults, , Spyware, Botnets, Malware, Privacy leakage attacks, vulnerability, Behavioral Model Analysis.Abstract
A lot of people are starting to take an interest in and buy smart phones that have application platforms. Many security risks have emerged as a result of the widespread usage of various apps. Permission control assaults, phishing, spyware, botnets, malware, and privacy leakage attacks are all forms of attacks that pose hazards. Invalid access control, data confidentiality breaches, and app authorization issues are among other concerns.
Downloads
References
A. of Chief Police Officers, ―Good practice guide for computer based electronic evidence,‖ ACPO, Tech. Rep.
K. Kent, S. Chevalier, T. Grance, and H. Dang, ―Guide to integrating forensic techniques into incident response,‖ National Institute of Standards and Technology, Tech. Rep.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Attribution — You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
NonCommercial — You may not use the material for commercial purposes.
No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.