Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Series

The University of Southern Mississippi

Publication Year
File Type

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Privacy-Preserving Non-Participatory Surveillance System For Covid-19-Like Pandemics, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, Maazen Alsabaan Jan 2021

Privacy-Preserving Non-Participatory Surveillance System For Covid-19-Like Pandemics, Mahmoud Nabil, Ahmed Sherif, Mohamed Mahmoud, Waleed Alsmary, Maazen Alsabaan

Faculty Publications

COVID-19 pandemic has revealed a pressing need for an effective surveillance system to control the spread of infection. However, the existing systems are run by the people’s smartphones and without a strong participation from the people, the systems become ineffective. Moreover, these systems can be misused to spy on people and breach their privacy. Due to recent privacy breaches, people became anxious about their privacy, and without privacy reassurance, the people may not accept the systems. In this paper, we propose a non-participatory privacy-preserving surveillance system for COVID-19-like pandemics. The system aims to control the spread of COVID-19 infection without …


Malware Analysis On Android Using Supervised Machine Learning Techniques, Md Shohel Rana, Andrew H. Sung Oct 2018

Malware Analysis On Android Using Supervised Machine Learning Techniques, Md Shohel Rana, Andrew H. Sung

Faculty Publications

In recent years, a widespread research is conducted with the growth of malware resulted in the domain of malware analysis and detection in Android devices. Android, a mobile-based operating system currently having more than one billion active users with a high market impact that have inspired the expansion of malware by cyber criminals. Android implements a different architecture and security controls to solve the problems caused by malware, such as unique user ID (UID) for each application, system permissions, and its distribution platform Google Play. There are numerous ways to violate that fortification, and how the complexity of creating a …