Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
Delegate the smartphone user? Security awareness in smartphone platforms
A Mylonas, A Kastania, D Gritzalis - Computers & Security, 2013 - Elsevier
Smartphone users increasingly download and install third-party applications from official
application repositories. Attackers may use this centralized application delivery architecture …
application repositories. Attackers may use this centralized application delivery architecture …
The insider threat in cloud computing
M Kandias, N Virvilis, D Gritzalis - … September 8-9, 2011, Revised Selected …, 2013 - Springer
Cloud computing is an emerging technology paradigm, enabling and facilitating the dynamic
and versatile provision of computational resources and services. Even though the …
and versatile provision of computational resources and services. Even though the …
Trusted Computing vs. Advanced Persistent Threats: Can a defender win this game?
N Virvilis, D Gritzalis… - 2013 IEEE 10th …, 2013 - ieeexplore.ieee.org
As both the number and the complexity of cyber attacks continuously increase, it is
becoming evident that traditional security mechanisms have limited success in detecting …
becoming evident that traditional security mechanisms have limited success in detecting …
A risk assessment method for smartphones
Smartphones are multi-purpose ubiquitous devices, which face both, smartphone-specific
and typical security threats. This paper describes a method for risk assessment that is …
and typical security threats. This paper describes a method for risk assessment that is …
Modeling and enhancing android's permission system
Several works have recently shown that Android's security architecture cannot prevent many
undesired behaviors that compromise the integrity of applications and the privacy of their …
undesired behaviors that compromise the integrity of applications and the privacy of their …
Smartphone sensor data as digital evidence
The proliferation of smartphones introduces new opportunities in digital forensics. One of the
reasons is that smartphones are usually equipped with sensors (eg accelerometer, proximity …
reasons is that smartphones are usually equipped with sensors (eg accelerometer, proximity …
Assessing privacy risks in android: A user-centric approach
The increasing presence of privacy violating apps in app marketplaces poses a significant
privacy risk for smartphone users. Current approaches assessing privacy risk lack user …
privacy risk for smartphone users. Current approaches assessing privacy risk lack user …
Playing with danger: A taxonomy and evaluation of threats to smart toys
Smart toys have captured an increasing share of the toy market, and are growing ubiquitous
in households with children. Smart toys are a subset of Internet of Things (IoT) devices …
in households with children. Smart toys are a subset of Internet of Things (IoT) devices …
[BOOK][B] Extracting Malware Threat Patterns on a Mobile Platform
GJK Jakka - 2021 - search.proquest.com
This study focuses on the rapidly increasing frequency of smartphone malware attacks
since2019. Most users have relied on smartphones as they are a rich source of valuable …
since2019. Most users have relied on smartphones as they are a rich source of valuable …