Mobile phishing attacks and defence mechanisms: State of art and open research challenges
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …
information, resulting in financial loss of individuals as well as organisations. Nowadays …
Mobile security: Threats and best practices
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …
Internet of Things in healthcare: Interoperatibility and security issues
Internet of Things devices being used now expose limitations that prevent their proper use in
healthcare systems. Interoperability and security are especially impacted by such limitations …
healthcare systems. Interoperability and security are especially impacted by such limitations …
Smartphone malware and its propagation modeling: A survey
S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …
malware writers. Motivated by the significant threat that presents to legitimate users, we …
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
Survey on threats and attacks on mobile networks
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …
to evolve, bringing into the network architecture new interfaces and protocols, as well as …
Unmanned aerial vehicle smart device ground control station cyber security threat model
K Mansfield, T Eveleigh, TH Holzer… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The Department of the Defense has transitioned smart devices into the battlefield as a
portable hand-held unmanned aerial vehicle ground control station without adequate cyber …
portable hand-held unmanned aerial vehicle ground control station without adequate cyber …
Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …
emergence of new computing paradigms that have gained importance across a wide …
An in-depth analysis of Android malware using hybrid techniques
Android malware is widespread despite the effort provided by Google in order to prevent it
from the official application market, Play Store. Two techniques namely static and dynamic …
from the official application market, Play Store. Two techniques namely static and dynamic …
[HTML][HTML] Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator
During the past decade, mobile attacks have been established as an indispensable attack
vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the …
vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the …