AUTOMATIC DETECTION AND PREVENTION OF VIRUS IN MOBILE ENVIRONMENT
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 5
Abstract
Mobile phone becomes an essential device for everyone due to the need and drastic growth of technology. Mobile phones have truly transformed the mode of communications. It becomes the basic requirement of life. It is very difficult to imagine the live without a mobile phone as most of the work is done using mobile phones. They are not just narrowed only for communication purpose by using mobile phone one can able to access internet, send SMS, MMS, chat and share images, files via Bluetooth. The malicious virus, worms can also spread from one mobile to another by using operational or human behavior. The severe impact of malicious virus and worms may leads to lack of user privacy, eavesdropping, draining of battery charges. Moreover, it may track the user location using GPS technology or jams the server and spreads spam messages. In this paper, the developed application detects and deletes the virus that has been send via SMS finally the relevant patches is installed into the mobile to prevent from severe damage.
Authors and Affiliations
R. Priya
STOCHASTIC PERFORMANCE MODELING OF MANETS IMPLEMENTING AODV UNDER HIDDEN-EXPOSED TERMINAL PROBLEM
A Mobile Ad-hoc NETwork (MANET) is a collection of wireless mobile nodes forming a self-configuring network without using any existing infrastructure. MANETs catch the great attention of researchers because of its unique...
A Performance Improvement System (College-Net) for Energy Saving in Campus Networks towards Green Computing
In corporate networks, idle desktop machines hardly ever sleep, mainly for the reason that turning off the hosts will affect the internet connection. There are number of systems have been proposed, few of them have mutua...
STUDY OF SERVER LOAD BALANCING TECHNIQUES
One of the critical scheduling problems in distributed computing environment is load balancing on a cluster of replicated servers which face a constant pressure of increased network traffic and diverse load levels. The k...
PROPOSED ARCHITECTURE: CLOUD BASED MEDICAL INFORMATION RETRIEVAL NETWORK
The latest developments and advancements in the computer science and information technology promise a massive potential that can be harnessed for the improvement of healthcare services especially in the developing countr...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...