The current state and future of mobile security in the light of the recent mobile security threat reports

AC Cinar, TB Kara - Multimedia Tools and Applications, 2023 - Springer
Smartphones have become small computers that meet many of our needs, from e-mail and
banking transactions to communication and social media use. In line with these attractive …

Social network data analysis to highlight privacy threats in sharing data

F Cerruto, S Cirillo, D Desiato, SM Gambardella… - Journal of Big Data, 2022 - Springer
Social networks are a vast source of information, and they have been increasing impact on
people's daily lives. They permit us to share emotions, passions, and interactions with other …

[HTML][HTML] Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study

X Fernández-Fuentes, TF Pena, JC Cabaleiro - Computers & Security, 2022 - Elsevier
The web browser has become one of the basic tools of everyday life. A tool that is
increasingly used to manage personal information. This has led to the introduction of new …

[PDF][PDF] A Visual Privacy Tool to Help Users in Preserving Social Network Data.

S Cirillo, D Desiato, M Scalera, G Solimando - IS-EUD Workshops, 2023 - ceur-ws.org
In the current era, social network platforms are increasingly important, especially for
disseminating data that refers to virtual lives that, in most cases, are strictly coupled with real …

A machine learning based sentient multimedia framework to increase safety at work

G Bonifazi, E Corradini, D Ursino, L Virgili… - Multimedia tools and …, 2022 - Springer
In the last few decades, we have witnessed an increasing focus on safety in the workplace.
ICT has always played a leading role in this context. One ICT sector that is increasingly …

Multi-Resolution Analysis with Visualization to Determine Network Attack Patterns

DH Jeong, BK Jeong, SY Ji - Applied Sciences, 2023 - mdpi.com
Analyzing network traffic activities is imperative in network security to detect attack patterns.
Due to the complex nature of network traffic event activities caused by continuously …

Fine-tuning SalGAN and PathGAN for extending saliency map and gaze path prediction from natural images to websites

E Corradini, G Porcino, A Scopelliti, D Ursino… - Expert Systems with …, 2022 - Elsevier
In recent years, researches dealing with the study of visual attention have become very
popular thanks to the enormous increase of Artificial Intelligence. Machine Learning and, in …

[HTML][HTML] Develo** a Hybrid Detection Approach to Mitigating Black Hole and Gray Hole Attacks in Mobile Ad Hoc Networks

M Yazdanypoor, S Cirillo, G Solimando - Applied Sciences, 2024 - mdpi.com
Mobile ad hoc networks (MANETs) have revolutionized wireless communications by
enabling dynamic, infrastructure-free connectivity across various applications, from disaster …

Interactive Web-Based Visual Analysis on Network Traffic Data

DH Jeong, JH Cho, F Chen, L Kaplan, A Jøsang, SY Ji - Information, 2022 - mdpi.com
Network traffic data analysis is important for securing our computing environment and data.
However, analyzing network traffic data requires tremendous effort because of the …

Weighted transformer neural network for web attack detection using request URL

KV Deshpande, J Singh - Multimedia Tools and Applications, 2024 - Springer
Web application firewalls (WAFs) and other Intrusion Detection Systems (IDS) techniques
are employed to defend the network against web attacks. Even so, attacks may succeed …