Skip to main content
Mobile malware has continued to grow at an alarming rate despite on-going mitigation efforts. This has been much more prevalent on Android due to being an open platform that is rapidly overtaking other competing platforms in the mobile... more
    • by 
    •   19  
      Machine LearningData MiningMobile TechnologyApplications of Machine Learning
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
    • by 
    •   4  
      Political ScienceMobile SecurityMobile appsMobile device security
The Android operating system has become the most popular operating system for smartphones and tablets leading to a rapid rise in malware. Sophisticated Android malware employ detection avoidance techniques in order to hide their malicious... more
    • by  and +2
    •   13  
      Computer ScienceInformation SecurityComputer EngineeringMachine Learning
This paper’s purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement... more
    • by 
    •   5  
      Information SecuritySmall BusinessComputer SecurityMobile Security
In 2013, people will purchase 1.2 billion mobile devices, surpassing PC’s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their... more
    • by 
    •   5  
      Information SecurityComputer SecurityMobile SecurityMobile device security
Nikola Milosevic explains a threat model for analysing android security, and takes a look into android permissions, investigating how they may be used for malicious purposes.
    • by 
    •   3  
      AndroidMobile SecurityCyber Security
In order to address the increasing compromise of user privacy on mobile devices, a Fuzzy Logic based implicit authentication scheme is proposed in this paper. The proposed scheme computes an aggregate score based on selected features and... more
    • by  and +1
    •   9  
      Fuzzy LogicMobile TechnologyAccess ControlComputer Security
The increasing pace in the wireless communication taking momentum in the market of commercial application where a significant trade-off between user-experience and security demands exists. The Near Field Communication or NFC is one such... more
    • by 
    •   8  
      Information SecurityRFIDSecurityWireless security
Wireless (Wi-Fi) networks based on IEEE 802.11 1 family of standards have been spreading its coverage last years and this trend is expected to grow. Every day more and more people use this type of networks to access Internet, company or... more
    • by 
    •   19  
      Artificial IntelligenceMachine LearningNetwork SecurityWireless Sensor Networks
    • by 
    • Mobile Security
The purpose of this research is to explore the factors that influence a consumer before installing a mobile application. A research model is created based on perceived risk, trust, perceived benefit, and intent to install. Seven... more
    • by  and +1
    •   3  
      Mobile SecurityMobile appsMobile Devices
Smartphones are the most popular personal electronic devices. They are used for all sorts of purposes, from managing bank accounts to playing games. As smartphone apps and services proliferate, the amount of sensitive data stored on or... more
    • by 
    •   4  
      BusinessComputer ScienceInformation Security and PrivacyMobile Security
    • by 
    •   5  
      Mobile SecurityMobile Computing and Wireless Communications, Information Security and Privacy, Digital Enterprises, Digital Governments, Digital Health.Mobile DevicesMobile device security
Deep web content cannot be indexed by search engine such as Google, Yahoo and Bing and darknet is lies within the deep web. Dark web has been intentionally hidden and it is not accessible through standard browser. Deep web can be accessed... more
    • by 
    •   7  
      Computer ScienceThe InternetMalware AnalysisMobile Security
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and... more
    • by 
    •   4  
      Intelligent SystemsMobile SecuritySmartphoneMobile Protected Areas
In 2013, people will purchase 1.2 billion mobile devices, surpassing PC’s as the most common method for accessing the Internet. The leading two mobile device platforms, Android and iOS, both have security concerns surrounding their... more
    • by  and +1
    •   6  
      Information SecurityComputer SecurityMobile SecurityInformation security awareness, training and education
With billions of people using smartphones and the exponential growth of smartphone apps, it is prohibitive for app marketplaces, such as Google App Store, to thoroughly verify if an app is legitimate or malicious. As a result, mobile... more
    • by  and +1
    •   24  
      Computer ScienceComputer Security And ReliabilityInformation SecurityComputer Engineering
    • by 
    • Mobile Security
Mobile devices pose interesting challenges and opportunities in the area of computer security. As the functionality of mobile devices increase so are the threats. Nowadays, smartphone users can email, video call, use social networking... more
    • by 
    • Mobile Security
    • by 
    •   5  
      Network SecurityMobile SecurityWireless Network SecurityCyber Security
    • by 
    •   4  
      Network SecurityMobile SecurityOWASPCoding Standards
The intrinsic vulnerabilities in the cyberspace and ever-escalating cyber-attacks tend to continuously threaten the national security, economy and daily life of citizens. More than fifty countries, around the world, have formulated their... more
    • by 
    •   24  
      Information SystemsComputer ScienceComputer Security And ReliabilitySoftware Engineering
    • by 
    •   9  
      MathematicsComputer ScienceMachine LearningAndroid
    • by 
    •   6  
      Cloud ComputingDigital ForensicsMobile SecuritySmartphones
E-government is one of the most rapidly evolving service domains in the contemporary information society. Many governments have already developed and provided e-government services to businesses and citizens. Nowadays actors in the... more
    • by 
    •   9  
      Information SocietyWireless SystemsMobile SecurityBest practice
— Today, encryption is considered as a basic security measure to ensure protection of sensitive data contained within storage devices from external physical threats (such as people on-site) as well as network threats (such as malicious... more
    • by  and +1
    •   3  
      Mobile SecurityCloud Computing SecurityBlockchains
In era of technological advancement and globalization , mobile devices have become a necessity for us ,almost everyone has a mobile device or access to one. They have made the world accessible and communication convenient, all at the... more
    • by 
    •   5  
      AndroidMobile SecurityCyber SecurityApple IOS
The Indian government, like governments elsewhere in the world, has chosen mobile device as preferred platform to engage with citizens while offering various e-Governance services. Likewise there is huge market for mobile based e-Commerce... more
    • by 
    •   6  
      Mobile SecurityPrivacy and SecurityKey wordsM Commerce
Android, being the most widespread mobile operating systems is increasingly becoming a target for malware. Malicious apps designed to turn mobile devices into bots that may form part of a larger botnet have become quite common, thus... more
    • by  and +1
    •   6  
      Computer ScienceMachine LearningMobile SecurityMalware Detection
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
    • by 
    •   4  
      Political ScienceMobile SecurityMobile appsMobile device security
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
    • by 
    •   4  
      Political ScienceMobile SecurityMobile appsMobile device security
Computer security, also known as cybersecurity or IT security, is the protection of information systems from theft or damage to the hardware, the software, and to the information on them, as well as from disruption or misdirection of the... more
    • by 
    •   3  
      Computer SecurityComputer and Network SecurityMobile Security
This paper offers an up-to-date, comprehensive, extensive and targeted survey on Behavioral Biometrics and Continuous Authentication technologies for mobile devices. Our aim is to help interested researchers to effectively grasp the... more
    • by 
    •   8  
      Machine LearningSurvey ResearchBiometrics Authentication TechnologiesMobile Security
Smartphones are one of the biggest technology achievements in today's world as they have are helping us in several ways and have now become an integral part of our daily life. From making calls to delivering presentations and from... more
    • by 
    •   7  
      Information SecurityPrivacyInformation Security and PrivacyAndroid
To improve the security of mobile management is to identify and analyze the needs of wireless mobility that revolve around the protection modules data lost or stolen devices through remote functions To achieve this, it was first necessary... more
    • by 
    •   11  
      Mobile DatabaseData WarehouseNetwork and Mobile IPv6 SecurityMobile Security
—This paper studies the use of Visual Basic.net to simulate mathematics and some numerical iterations. The proposed simulator is an enhancement to the work of (Azizu, 2015). The proposed simulator uses Visual Basic 2010 to model and... more
    • by  and +1
    •   2  
      Software EngineeringMobile Security
—Android is becoming ubiquitous and currently has the largest share of the mobile OS market with billions of application downloads from the official app market. It has also become the platform most targeted by mobile malware that are... more
    • by  and +1
    •   8  
      Network SecurityMalware AnalysisMalwareApplication Security
Nikola Milosevic explains a threat model for analysing android security, and takes a look into
android permissions, investigating how they may be used for malicious purposes.
    • by 
    •   3  
      AndroidMobile SecurityCyber Security
1。  时代的变迁
2。 启示录:  一个行业的兴衰
3。 移动互联网时代创新的思维
4。 移动互联网的安全问题
    • by 
    •   8  
      HistoryInnovation statisticsMobile TechnologyMobile Computing
In this paper the research surrounding the Augmented Reality in games on Android platform was performed by testing 108 games from Google Play Market and by analyzing the hundreds of user reviews to determine the level of acceptance and... more
    • by 
    •   36  
      Computer ScienceImage ProcessingVirtual Reality (Computer Graphics)Mobile Technology
Mobile phone; which in some few years past was nothing more than a call-making tool, and at best for text messaging, has evolved to be very powerful device, hence the modern name: Smartphone. Smartphone’s unique computing capabilities,... more
    • by 
    •   3  
      Web TechnologiesData mining (Data Analysis)Mobile Security
The research and communications for detecting mobile security threats with the best protection practices of applications have become essential goals nowadays due to the continuous discoveries of new vulnerabilities. The internet and... more
    • by 
    •   9  
      Computer ScienceInformation SecurityData MiningMobile Technology
By offering sophisticated services and centralizing a huge volume of personal data, modern smartphones changed the way we socialize, entertain and work. To this aim, they rely upon complex hardware/software frameworks leading to a number... more
    • by 
    •   4  
      Network SecuritySteganographyMobile SecurityInformation Hiding
Acquisition, decoding and presentation of information from mobile devices is complex and challenging. Device memory is usually integrated into the device, making isolation prior to recovery difficult. In addition, manufacturers have... more
    • by  and +1
    •   5  
      Digital ForensicsMobile SecurityMobile DevicesMobile device security
This report reviews the influence of Artificial Intelligence (AI) on cyber security processes. For example, artificial intelligence consists of a bunch of practices that are covering machine learning, deep learning, neural networks,... more
    • by 
    •   15  
      Artificial IntelligenceInfluenceHuman SecurityEvolution
Mobile devices, including smartphones and tablets, enable users to access corporate data from anywhere. In 2013, people will purchase 1.2 billion mobile devices, surpassing personal computers as the most common method for accessing the... more
    • by 
    •   5  
      Information SecurityMobile SecurityInformation Systems educationINFORMATION TECHNOLOGY EDUCATION
The Android operating system has been the most popular for smartphones and tablets since 2012. This popularity has led to a rapid raise of Android malware in recent years. The sophistication of Android malware obfuscation and detection... more
    • by 
    •   5  
      Machine LearningAndroidMobile SecurityDynamic Analysis
Android malware has been on the rise in recent years due to the increasing popularity of Android and the proliferation of third party application markets. Emerging Android malware families are increasingly adopting sophisticated detection... more
    • by 
    •   9  
      Machine LearningStatic AnalysisComputer SecurityMalware Analysis
The main contribution of this paper is providing an architecture for mobile users to authenticate user identity through short text phrases using robust open source voice recognition library ALIZE and speaker recognition tool LIA_RAL.... more
    • by  and +1
    •   3  
      Speaker IdentificationMobile SecurityVoice Recognition
Over the last years, there has been a real revolution of mobile devices, which has effectively translated into the exponential increase in internet access rates on a mobile device as opposed to accessing it on desktop systems. Given the... more
    • by 
    •   3  
      Mobile SecurityMobile appsMobile device security