[HTML][HTML] Behavioral analysis of cybercrime: Paving the way for effective policing strategies

G Sarkar, SK Shukla - Journal of Economic Criminology, 2023 - Elsevier
This comprehensive survey paper offers a panoramic exploration of the dynamic realm of
cybercrime policing, encompassing a wide spectrum of intricacies from cybercrime …

A survey on sensor-based threats and attacks to smart devices and applications

AK Sikder, G Petracca, H Aksu… - … Surveys & Tutorials, 2021 - ieeexplore.ieee.org
Modern electronic devices have become “smart” as well as omnipresent in our day-to-day
lives. From small household devices to large industrial machines, smart devices have …

A survey on sensor-based threats to internet-of-things (iot) devices and applications

AK Sikder, G Petracca, H Aksu, T Jaeger… - arxiv preprint arxiv …, 2018 - arxiv.org
The concept of Internet of Things (IoT) has become more popular in the modern era of
technology than ever before. From small household devices to large industrial machines, the …

{6thSense}: A context-aware sensor-based attack detector for smart devices

AK Sikder, H Aksu, AS Uluagac - 26th USENIX Security Symposium …, 2017 - usenix.org
Sensors (eg, light, gyroscope, accelerometer) and sensing enabled applications on a smart
device make the applications more user-friendly and efficient. However, the current …

The role of the adversary model in applied security research

Q Do, B Martini, KKR Choo - Computers & Security, 2019 - Elsevier
Adversary models have been integral to the design of provably-secure cryptographic
schemes or protocols. However, their use in other computer science research disciplines is …

A context-aware framework for detecting sensor-based threats on smart devices

AK Sikder, H Aksu, AS Uluagac - IEEE Transactions on Mobile …, 2019 - ieeexplore.ieee.org
Sensors (eg, light, gyroscope, and accelerometer) and sensing-enabled applications on a
smart device make the applications more user-friendly and efficient. However, the current …

A systematic deconstruction of human-centric privacy & security threats on mobile phones

H Farzand, M Abraham, S Brewster… - … Journal of Human …, 2024 - Taylor & Francis
Mobile phones are most likely the subject of targeted attacks, such as software exploits. The
resources needed to carry out such attacks are becoming increasingly available and, hence …

Exploring touch-based behavioral authentication on smartphone email applications in IoT-enabled smart cities

W Li, W Meng, S Furnell - Pattern Recognition Letters, 2021 - Elsevier
Abstract The Internet of Things (IoT) allows various embedded devices and smart sensors to
be connected with each other, which provides a basis for building smart cities. The IoT …

No free charge theorem: A covert channel via usb charging cable on mobile devices

R Spolaor, L Abudahi, V Moonsamy, M Conti… - … and Network Security …, 2017 - Springer
More and more people are regularly using mobile and battery-powered handsets, such as
smartphones and tablets. At the same time, thanks to the technological innovation and to the …

A Robust IoT‐Based Three‐Factor Authentication Scheme for Cloud Computing Resistant to Session Key Exposure

F Wang, G Xu, G Xu, Y Wang… - … and Mobile Computing, 2020 - Wiley Online Library
With the development of Internet of Things (IoT) technologies, Internet‐enabled devices
have been widely used in our daily lives. As a new service paradigm, cloud computing aims …