A systematic literature review and a conceptual framework proposition for advanced persistent threats (APT) detection for mobile devices using artificial intelligence …
Advanced persistent threat (APT) refers to a specific form of targeted attack used by a well-
organized and skilled adversary to remain undetected while systematically and continuously …
organized and skilled adversary to remain undetected while systematically and continuously …
Security analysis of smartphone and cloud computing authentication frameworks and protocols
We live in a digital world where every detail of our information is being transferred from one
smart device to another via cross-platform, third-party cloud services. Smart technologies …
smart device to another via cross-platform, third-party cloud services. Smart technologies …
[كتاب][B] Smartphones within psychological science
DA Ellis - 2020 - books.google.com
Psychologists can now quantify behaviours beyond the laboratory using a mass-adopted,
unified system that is primed for data capture aka smartphones. This is the first book to bring …
unified system that is primed for data capture aka smartphones. This is the first book to bring …
[PDF][PDF] The Design and Development of Mobile Game to Promote Secure Smartphone Behaviour.
Smartphones have evolved significantly in different ways over the years. Currently, Android
and iOS dominate the market, followed by other operating systems. Along with the evolution …
and iOS dominate the market, followed by other operating systems. Along with the evolution …
A Comparative Analysis of Smartphone Security Behaviors and Practices.
This study on smartphone security behaviors and practices is a continuation of the work in
Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive …
Jones and Chin (2015), where results of a 2011 student survey at a regional comprehensive …
Advance Security Schemes for Smart Societies
Internet technology has become a boon to humans as it transformed our way of thinking and
changed our way of living. What looked like a scene from a sci-fi movie has become a reality …
changed our way of living. What looked like a scene from a sci-fi movie has become a reality …
Consideraciones de seguridad para el comercio electrónico en dispositivos móviles inteligentes
El comercio electrónico en entornos móviles tiene más de tres décadas de investigación y
desarrollo. Sin embargo, los cambios tecnológicos hacia redes de telecomunicaciones de …
desarrollo. Sin embargo, los cambios tecnológicos hacia redes de telecomunicaciones de …
Metodología para la selección de herramientas eficientes y protocolos adecuados para mejorar la seguridad de los dispositivos móviles
DM Erreyes Pinzón - 2017 - dspace.ucuenca.edu.ec
Currently there are tools to protect the information contained in mobile devices, many users
are unaware of the risks involved in not using the appropriate protection measures; On the …
are unaware of the risks involved in not using the appropriate protection measures; On the …
SCEAMS: Secure corporate environment adhered to mobile & smartphones
Due to increased use of smartphones in enterprise setup several security threats have also
been penetrated in it. Threats and risks become increased, especially when these …
been penetrated in it. Threats and risks become increased, especially when these …
Static Analysis of Android Programs for Malware Detection
A Maalouf - 2021 - search.proquest.com
Mobile devices access and manage data of critical importance to the end-user. The Android
platform uses a permission-based security model to protect the device's sensitive resources …
platform uses a permission-based security model to protect the device's sensitive resources …