[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ali et al., 2022 - Google Patents

AI-enabled cybernetic analytics of security models for smart serious games-based mobile operating systems

Ali et al., 2022

View PDF
Document ID
9019064286836386560
Author
Ali A
Jamil F
Whangbo T
Ahmad S
Publication year
Publication venue
Proc. Artif. Intell. Trends Technol.

External Links

Snippet

Smart serious games are games which are primarily designed for a serious job such as education and training rather than entertainment. Mobile Phones are an essential enabler of smart serious games. Over the past few years, there has been an exponential growth in the …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/22Tracking the activity of the user
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATIONS NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
    • H04W12/08Access security

Similar Documents

Publication Publication Date Title
US11356431B2 (en) Operating system integrated domain management
US9396325B2 (en) Provisioning an app on a device and implementing a keystore
US20140040622A1 (en) Secure unlocking and recovery of a locked wrapped app on a mobile device
US20140250511A1 (en) Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing
US20160314299A1 (en) Mobile Device with Improved Security
US11824832B2 (en) Prevention of malicious use of endpoint devices
Al-Qershi et al. Android vs. iOS: The security battle
US20150264047A1 (en) Method and system for providing secure communication between multiple operating systems in a communication device
US11544415B2 (en) Context-aware obfuscation and unobfuscation of sensitive content
CN103036852B (en) A kind of method and device realizing network entry
Sikder et al. A survey on android security: development and deployment hindrance and best practices
CN116011590A (en) Federal learning method, device and system
CN116050537A (en) Federal learning method and device, readable storage medium and electronic equipment
Ali et al. AI-enabled cybernetic analytics of security models for smart serious games-based mobile operating systems
CN109802927B (en) Security service providing method and device
Tully et al. Mobile security: a practitioner’s perspective
Igor et al. Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals.
Gorbāns et al. The Myths of and Solutions for Android OS Controlled and Secure Environment
Singhal Survey on security issues in mobile cloud computing and preventive measures
Vigo, Jr Inside Job
US20240146534A1 (en) Conditional time-based one time password token issuance based on locally aggregated device risk
Wu et al. TrustyShare: A Sharing Scheme using ARM TrustZone
Scholar A Sustainable Development Framework and Application of Mobile Cloud Computing (MCC): A Review Paper Mustapha Kassim; Umar Bello; & Koiranga Abdullahi Hammanadama
Akter et al. Securing app distribution process of iOS exploiting the notion of authentic update
JAHNAVI DATA STORAGE OPERATIONS PROTECTION IN MOBILE CLOUD COMPUTING.