Skip to content
VuFind
Advanced
  • Root exploit detection and fea...
  • Cite this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Permanent link
Root exploit detection and features optimization: Mobile device and blockchain based medical data management

Root exploit detection and features optimization: Mobile device and blockchain based medical data management

The increasing demand for Android mobile devices and blockchain has motivated malware creators to develop mobile malware to compromise the blockchain. Although the blockchain is secure, attackers have managed to gain access into the blockchain as legal users, thereby comprising important and crucial...

Full description

Bibliographic Details
Main Authors: Ahmad Firdaus, Zainal Abidin, Nor Badrul, Anuar, Mohd Faizal, Ab Razak, Targio Hashem, Ibrahim Abaker, Syafiq, Bachok, Sangaiah, Arun Kumar
Format: Article
Language:English
Published: Springer New York 2018
Subjects:
QA76 Computer software
Online Access:http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/1/Root%20exploit%20detection%20and%20features%20optimization-%20Mobile%20device%20and%20blockchain%20based%20medical%20data%20management.pdf
  • Holdings
  • Description
  • Similar Items
  • Staff View

Internet

http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/
http://umpir.ump.edu.my/id/eprint/23001/1/Root%20exploit%20detection%20and%20features%20optimization-%20Mobile%20device%20and%20blockchain%20based%20medical%20data%20management.pdf

Similar Items

  • The rise of “blockchain”: bibliometric analysis of blockchain study
    by: Firdaus, Ahmad, et al.
    Published: (2019)
  • Bio-Inspired Computational Paradigm for Feature Investigation and Malware Detection: Interactive Analytics
    by: Ahmad, Firdaus, et al.
    Published: (2017)
  • Bio-inspired for Features Optimization and Malware Detection
    by: Mohd Faizal, Ab Razak, et al.
    Published: (2018)
  • RPC/DCOM exploits detection and notification
    by: Halim, Ayub
    Published: (2005)
  • Discovering optimal features using static analysis and a genetic search based method for Android malware detection
    by: Ahmad Firdaus, Zainal Abidin, et al.
    Published: (2018)

Search Options

  • Advanced Search

Find More

  • Browse the Catalog

Need Help?

  • Search Tips
Cannot write session to /tmp/vufind_sessions/sess_qcvrj4lqhro4bftgsrincf7adj