SnapMe if you can: Privacy threats of other peoples' geo-tagged media and what we can do about it

B Henne, C Szongott, M Smith - … of the sixth ACM conference on Security …, 2013 - dl.acm.org
The amount of media uploaded to the Web is still rapidly expanding. The ease-of-use of
modern smartphones in combination with the proliferation of high-speed mobile networks …

A study on formal methods to generalize heterogeneous mobile malware propagation and their impacts

A Mahboubi, S Camtepe, H Morarji - IEEE Access, 2017 - ieeexplore.ieee.org
Mobile personal devices, such as smartphones, USB thumb drives, and sensors, are
becoming essential elements of our modern lives. Their large-scale pervasive deployment …

Evaluating the threat of epidemic mobile malware

C Szongott, B Henne, M Smith - 2012 IEEE 8th international …, 2012 - ieeexplore.ieee.org
While mobile malware has played a relatively small role compared to the behemoth of
desktop malware, the changes both in the capability as well as in the proliferation of the …

Experiential Transformation in Privacy Behavior: A New Framework for Privacy Behavior Enhancement

I Paspatis, A Tsohou - Journal of Cybersecurity and Privacy, 2024 - mdpi.com
Multiple studies have demonstrated that the conventional method of learning is suboptimal
when our goal is to enhance individuals' genuine privacy behavior. This study introduces a …

Towards privacy-preserving data dissemination in crowd-sensing middleware platform

R Sommerard, R Rouvoy - 11èmes journées francophones Mobilité …, 2016 - inria.hal.science
Crowd-sensing, also known as mobile crowdsourcing, is a growing research topic, which
consists in engaging end users in the process of gathering physical measurements in the …

Mobile evil twin malnets–the worst of both worlds

C Szongott, B Henne, M Smith - International Conference on Cryptology …, 2012 - Springer
The mobile computing world is undergoing major changes both in the capability as well as
in the proliferation of mobile devices. While, up to now, mobile malware has played a …

Coupled multi-agent simulations for mobile security & privacy research

B Henne, C Szongott, M Smith - 2012 6th IEEE International …, 2012 - ieeexplore.ieee.org
The complexity of mobile device digital ecosystems is rapidly increasing. Not only the
absolute number of mobile devices, but also their diversity is on an ongoing rise. Devices …

A simulation framework to evaluate virtual cpu scheduling algorithms

C Pham, Q Li, Z Estrada… - 2013 IEEE 33rd …, 2013 - ieeexplore.ieee.org
Virtual CPU (VCPU) scheduling algorithms that efficiently manage processing-resource at
the machine virtualization layer are key to facilitate resource sharing and workload …

Security of critical information infrastructures exposed to mobile personal devices

A Mahboubi - 2018 - eprints.qut.edu.au
This thesis investigates both new intrusive and new unobtrusive methods which prevent
compromised mobile personal devices from infiltrating critical information infrastructures …

[PDF][PDF] Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen Netzwerken

C Szongott - 2015 - repo.uni-hannover.de
Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht vertrauenswürdigen
Netzwerken Page 1 Kontextbasierte Sicherheitsmaßnahmen für mobile Geräte in nicht …