Detecting false messages in the smartphone fault reporting system
The emergence of the Internet of Things (IoT) in Smart City allows mobile application developers to develop reporting services with an aim for local citizens to interact with municipalities regarding city issues in an efficient manner. However, the credibility of the messages sent rise as a great ch...
| Main Authors: | Rajoo, Sharmiladevi, Magalingam, Pritheega, Samy, Ganthan Narayana, Maarop, Nurazean, Idris, Norbik Bashah, Shanmugam, Bharanidharan, Perumal, Sundaresan |
|---|---|
| Other Authors: | Saeed, Faisal |
| Format: | Proceeding Paper |
| Language: | English English English |
| Published: |
Springer
2020
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/75240/ http://irep.iium.edu.my/75240/1/75240_Detecting%20false%20messages%20in%20the%20smartphone_MYRA.pdf http://irep.iium.edu.my/75240/2/75240_Detecting%20false%20messages%20in%20the%20smartphone_SCOPUS.pdf http://irep.iium.edu.my/75240/13/75240_Detecting.pdf |
Similar Items
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019)
by: Ahmad, Azuan, et al.
Published: (2019)
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014)
Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things
by: Premylla, Jeremiah, et al.
Published: (2018)
by: Premylla, Jeremiah, et al.
Published: (2018)
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Improving message delay, handoff latency and binding update in high level nested network mobility
by: Babiker, Mohammed Ali, et al.
Published: (2015)
by: Babiker, Mohammed Ali, et al.
Published: (2015)
Cloud co-residency denial of service threat detection
inspired by artificial immune system
by: Ahmad, Azuan, et al.
Published: (2018)
by: Ahmad, Azuan, et al.
Published: (2018)
Improved hybrid intelligent intrusion detection system using AI technique
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
by: Shanmugam, Bharanidharan, et al.
Published: (2007)
The usage of smartphone among Malaysian university students
by: Ariff, Aishah, et al.
Published: (2018)
by: Ariff, Aishah, et al.
Published: (2018)
Comprehensive analysis on hardware forensic for gambling machine
by: Magalingam, Pritheega
Published: (2008)
by: Magalingam, Pritheega
Published: (2008)
Smartphone application for physical activity enhancement at workplace: would office workers actually use It?
by: Mohd Mohadis, Hazwani, et al.
Published: (2018)
by: Mohd Mohadis, Hazwani, et al.
Published: (2018)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Calculus and its applications in scale-free networks
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
An analysis of scheduling scheme for QoS guaranteed interactive multimedia over high speed wireless campus networks
by: Alam, M.K., et al.
Published: (2013)
by: Alam, M.K., et al.
Published: (2013)
Information security awareness through the use of social media
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
by: Abdul Molok, Nurul Nuha, et al.
Published: (2015)
Development of wearable pulse oximetry for telehealth monitoring system
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A scheduling algorithm for bandwidth aggregation in heterogeneous wireless network
by: Masud, M.H., et al.
Published: (2014)
by: Masud, M.H., et al.
Published: (2014)
Adaptive multi-rate video transcoding method
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
by: Fadlallah, Fadlallah Ali, et al.
Published: (2014)
Analysis of design principles and requirements for procedural rigging of bipeds and quadrupeds characters with custom manipulators for animation
by: Bhati, Zeeshan, et al.
Published: (2015)
by: Bhati, Zeeshan, et al.
Published: (2015)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
r-TOLA: an architecture for real time open learning application for universities
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2014)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
A computer vision-based alarming system for
real-time detection of driver sleep
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Robust and secure image steganography based on elliptic curve cryptography
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
by: Ahmed, Diaa Eldein Mustafa, et al.
Published: (2014)
Budaya digital merentasi sempadan: hambatan kepada budaya tempatan
by: Saidin, Aznan Zuhid
Published: (2014)
by: Saidin, Aznan Zuhid
Published: (2014)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Real-Time personalized stress detection from physiological signals
by: Syazani, Muhammad, et al.
Published: (2015)
by: Syazani, Muhammad, et al.
Published: (2015)
Performance evaluation of human identification based on ECG signal
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
by: Amiruddin, Ainunjariah, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Performance analysis of MAC layer scheduling schemes for IMM applications over high speed wireless campus network in IEEE802.11e
by: Alam, Md Korshed, et al.
Published: (2015)
by: Alam, Md Korshed, et al.
Published: (2015)
A review on scheduling schemes of high speed wireless campus network for Interactive Multimedia transmission
by: Alam, Md. Khorshed, et al.
Published: (2013)
by: Alam, Md. Khorshed, et al.
Published: (2013)
Comparison of X-band satellite link measurements with radar derived rain attenuation in the tropics
by: Badron, Khairayu, et al.
Published: (2014)
by: Badron, Khairayu, et al.
Published: (2014)
Evaluation of an enhanced scheme for high-level nested network mobility
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
by: Ali Mohammed, Mohammed Babiker, et al.
Published: (2015)
Pervasive learning using cloud computing
by: Shah, Asadullah
Published: (2015)
by: Shah, Asadullah
Published: (2015)
An empirical investigation of factors influencing user satisfaction with online services of mobile communication providers: study of Kuwait
by: Alzabi, Tami, et al.
Published: (2015)
by: Alzabi, Tami, et al.
Published: (2015)
Contribution of cloud computing in the reduction of carbon dioxide emission
by: Khan, Nusratullah, et al.
Published: (2014)
by: Khan, Nusratullah, et al.
Published: (2014)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
Performance evaluation of PAPR reduction with SER and BER by modified clipping & filtering in 3GPP LTE downlink
by: Arafat, M. Y. Arafat, et al.
Published: (2014)
by: Arafat, M. Y. Arafat, et al.
Published: (2014)
Performance evaluation of seed values and pause times over high speed Wireless Campus Network in IEEE802.11e
by: Alam Shishir, Md. Khorsed, et al.
Published: (2014)
by: Alam Shishir, Md. Khorsed, et al.
Published: (2014)
Similar Items
-
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015) -
Collaborative cloud IDS in detecting denial of service by dendritic cell mechanism
by: Ahmad, Azuan, et al.
Published: (2019) -
The most favourable mobile messaging apps
among IIUM students
by: Azhar Amanullah, Ayn Nur Azhana, et al.
Published: (2014) -
Potential Measures to Enhance Information Security Compliance in the Healthcare Internet of Things
by: Premylla, Jeremiah, et al.
Published: (2018) -
State of the art intrusion detection system for cloud computing
by: Ahmad, Azuan, et al.
Published: (2018)