Ali et al., 2022 - Google Patents
AI-enabled cybernetic analytics of security models for smart serious games-based mobile operating systemsAli et al., 2022
View PDF- Document ID
- 9019064286836386560
- Author
- Ali A
- Jamil F
- Whangbo T
- Ahmad S
- Publication year
- Publication venue
- Proc. Artif. Intell. Trends Technol.
External Links
Snippet
Smart serious games are games which are primarily designed for a serious job such as education and training rather than entertainment. Mobile Phones are an essential enabler of smart serious games. Over the past few years, there has been an exponential growth in the …
- 238000013473 artificial intelligence 0 abstract description 23
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/22—Tracking the activity of the user
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11356431B2 (en) | Operating system integrated domain management | |
US9396325B2 (en) | Provisioning an app on a device and implementing a keystore | |
US20140040622A1 (en) | Secure unlocking and recovery of a locked wrapped app on a mobile device | |
US20140250511A1 (en) | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |
US20160314299A1 (en) | Mobile Device with Improved Security | |
US11824832B2 (en) | Prevention of malicious use of endpoint devices | |
Al-Qershi et al. | Android vs. iOS: The security battle | |
US20150264047A1 (en) | Method and system for providing secure communication between multiple operating systems in a communication device | |
US11544415B2 (en) | Context-aware obfuscation and unobfuscation of sensitive content | |
CN103036852B (en) | A kind of method and device realizing network entry | |
Sikder et al. | A survey on android security: development and deployment hindrance and best practices | |
CN116011590A (en) | Federal learning method, device and system | |
CN116050537A (en) | Federal learning method and device, readable storage medium and electronic equipment | |
Ali et al. | AI-enabled cybernetic analytics of security models for smart serious games-based mobile operating systems | |
CN109802927B (en) | Security service providing method and device | |
Tully et al. | Mobile security: a practitioner’s perspective | |
Igor et al. | Security Software Green Head for Mobile Devices Providing Comprehensive Protection from Malware and Illegal Activities of Cyber Criminals. | |
Gorbāns et al. | The Myths of and Solutions for Android OS Controlled and Secure Environment | |
Singhal | Survey on security issues in mobile cloud computing and preventive measures | |
Vigo, Jr | Inside Job | |
US20240146534A1 (en) | Conditional time-based one time password token issuance based on locally aggregated device risk | |
Wu et al. | TrustyShare: A Sharing Scheme using ARM TrustZone | |
Scholar | A Sustainable Development Framework and Application of Mobile Cloud Computing (MCC): A Review Paper Mustapha Kassim; Umar Bello; & Koiranga Abdullahi Hammanadama | |
Akter et al. | Securing app distribution process of iOS exploiting the notion of authentic update | |
JAHNAVI | DATA STORAGE OPERATIONS PROTECTION IN MOBILE CLOUD COMPUTING. |