Worm penetration from desktop to mobile

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-36 Number-4
Year of Publication : 2016
Authors : Ankur Singh Bist, Dr. Anuj Sharma
  10.14445/22312803/IJCTT-V36P134

MLA

Ankur Singh Bist, Dr. Anuj Sharma "Worm penetration from desktop to mobile". International Journal of Computer Trends and Technology (IJCTT) V36(4):192-196 June 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Complexity of network applications has enhanced the problem of computer worms. At the same time the advancement in technology has given rise to evolution of portable mobile devices. It has become the danger point of day today activities like mails, mobile banking etc. Malware designer are also observing the same trend, due to the same reason lot of mobile malwares have arisen. This paper includes the discussion about penetration of malwares especially worms from desktop to mobile.

References
1. Bist, Ankur Singh. "Classification and identification of Malicious codes." (2012).
2. Bist, Ankur Singh. "Hybrid model for Computer Viruses: an Approach towards Ideal Behavior." (2012).
3. Bist, Ankur Singh. "Detection of metamorphic viruses: A survey." Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on. IEEE, 2014.
4. Sharma, Rudranshu, and Ankur Singh Bist. "Genetic algorithm based weighted extreme learning machine for binary imbalance learning." Cognitive Computing and Information Processing (CCIP), 2015 International Conference on. IEEE, 2015.
5. Sharma, Rudranshu, and Ankur Singh Bist. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY MACHINE LEARNING: A SURVEY."
6. Das, Purushottam, and Ankur Singh Bist. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY FEATURE SELECTION."
7. Kumar, Babeesh, Sushila Vikas Maheshkar, and Ankur Singh Bist. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Image Segmentation using Enhanced K-means clustering with divide and Conquer Approach."
8. Kumar, Vikas, and Ankur Singh Bist. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY CLUSTER ANALYSIS: A SURVEY."
9. Pandey, Neha, B. K. Singh, and Ankur Singh Bist. "A novel feature learning for image classification using wrapper approach in GA." Signal Processing and Integrated Networks (SPIN), 2015 2nd International Conference on. IEEE, 2015.
10. Sharma, Rudranshu, Ankur Singh Bist, and Vikas Kumar. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY EXTREME LEARNING MACHINE."
11. Bist, Ankur Singh. "INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY DETECTION OF COMPUTER VIRUSES USING WELM_ FPSO_FBFO."
12. Kumar, Amit, Vikas Chauhan, and Ankur Singh Bist. "Role of Artificial Neural Network in Welding Technology: A Survey." International Journal of Computer Applications 67.1 (2013).

Keywords
Mobile malware, Detection techniques, Unsolvable problems, Feature selection.