2020
DOI: 10.3390/electronics9081197
|View full text |Cite
|
Sign up to set email alerts
|

A Security Monitoring Framework for Mobile Devices

Abstract: Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…The Lambda architecture provides a means for dealing with vast amounts of data that uses a hybrid strategy to enable interaction with stream processing and batch processing approaches [30,31]. The lambda structure is made up of three layers: (1) Data processing in batches for precompiling vast sets of information, (2) real-time or speed computing to reduce latencies through performing real-time analyses as data comes, and (3) the serving layer that allows to reply to inquiries, connecting with inquiries, and providing outcomes of the computations.…”
Section: Proof-of-concept Of Lambda Architecturementioning
confidence: 99%
“…The Lambda architecture provides a means for dealing with vast amounts of data that uses a hybrid strategy to enable interaction with stream processing and batch processing approaches [30,31]. The lambda structure is made up of three layers: (1) Data processing in batches for precompiling vast sets of information, (2) real-time or speed computing to reduce latencies through performing real-time analyses as data comes, and (3) the serving layer that allows to reply to inquiries, connecting with inquiries, and providing outcomes of the computations.…”
Section: Proof-of-concept Of Lambda Architecturementioning
confidence: 99%
“…To evaluate the ability to block unwanted application functions selectively. Overhead and latency [85] Attack detection.…”
Section: Ref Requirement Under Considerationmentioning
confidence: 99%
“…In fact, lambda architecture is the state-of-the-art, real-time data processing technique [ 29 ]. However, many works on this topic are dedicated to the theoretical aspects of this architecture [ 9 , 30 ], with few recent real applications such as in E-Commerce Analytics [ 31 ] and intrusion and anomaly detection framework [ 32 ]. Authors in [ 7 ], for example, proposed a platform based on lambda architecture to accelerate automatic machine maintenance, but the application in a real situation was indicated as a future proposal of the work.…”
Section: Related Workmentioning
confidence: 99%