Mobile Security
3,666 Followers
Recent papers in Mobile Security
Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms in the mobile... more
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
This paper’s purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement... more
In 2013, people will purchase 1.2 billion mobile devices, surpassing PC’s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their... more
Nikola Milosevic explains a threat model for analysing android security, and takes a look into android permissions, investigating how they may be used for malicious purposes.
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such... more
Wireless (Wi-Fi) networks based on IEEE 802.11 1 family of standards have been spreading its coverage last years and this trend is expected to grow. Every day more and more people use this type of networks to access Internet, company or... more
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or... more
Deep web content cannot be indexed by search engine such as Google, Yahoo and Bing and darknet is lies within the deep web. Dark web has been intentionally hidden and it is not accessible through standard browser. Deep web can be accessed... more
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and... more
Mobile devices pose interesting challenges and opportunities in the area of computer security. As the functionality of mobile devices increase so are the threats. Nowadays, smartphone users can email, video call, use social networking... more
The intrinsic vulnerabilities in the cyberspace and ever-escalating cyber-attacks tend to continuously threaten the national security, economy and daily life of citizens. More than fifty countries, around the world, have formulated their... more
E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the... more
In era of technological advancement and globalization , mobile devices have become a necessity for us ,almost everyone has a mobile device or access to one. They have made the world accessible and communication convenient, all at the... more
The Indian government, like governments elsewhere in the world, has chosen mobile device as preferred platform to engage with citizens while offering various e-Governance services. Likewise there is huge market for mobile based e-Commerce... more
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the... more
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our aim is to help interested researchers to effectively grasp the... more
Smartphones are one of the biggest technology achievements in today's world as they have are helping us in several ways and have now become an integral part of our daily life. From making calls to delivering presentations and from... more
To improve the security of mobile management is to identify and analyze the needs of wireless mobility that revolve around the protection modules data lost or stolen devices through remote functions To achieve this, it was first necessary... more
Nikola Milosevic explains a threat model for analysing android security, and takes a look into
android permissions, investigating how they may be used for malicious purposes.
android permissions, investigating how they may be used for malicious purposes.
1。 时代的变迁
2。 启示录: 一个行业的兴衰
3。 移动互联网时代创新的思维
4。 移动互联网的安全问题
2。 启示录: 一个行业的兴衰
3。 移动互联网时代创新的思维
4。 移动互联网的安全问题
In this paper the research surrounding the Augmented Reality in games on Android platform was performed by testing 108 games from Google Play Market and by analyzing the hundreds of user reviews to determine the level of acceptance and... more
Mobile phone; which in some few years past was nothing more than a call-making tool, and at best for text messaging, has evolved to be very powerful device, hence the modern name: Smartphone. Smartphone’s unique computing capabilities,... more
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and... more
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number... more
This report reviews the influence of Artificial Intelligence (AI) on cyber security processes. For example, artificial intelligence consists of a bunch of practices that are covering machine learning, deep learning, neural networks,... more
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the... more
The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of Android malware obfuscation and detection... more
Android malware has been on the rise in recent years due to the increasing popularity of Android and the proliferation of third party application markets. Emerging Android malware families are increasingly adopting sophisticated detection... more
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more