A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Steganography in modern smartphones and mitigation techniques

W Mazurczyk, L Caviglione - IEEE Communications Surveys & …, 2014 - ieeexplore.ieee.org
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …

“Andromaly”: a behavioral malware detection framework for android devices

A Shabtai, U Kanonov, Y Elovici, C Glezer… - Journal of Intelligent …, 2012 - Springer
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …

Detecting Android malware using long short-term memory (LSTM)

R Vinayakumar, KP Soman… - Journal of Intelligent …, 2018 - content.iospress.com
Abstract Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN)
which is specifically used to train to learn long-term temporal dynamics with sequences of …

Automated static code analysis for classifying android applications using machine learning

A Shabtai, Y Fledel, Y Elovici - 2010 international conference …, 2010 - ieeexplore.ieee.org
In this paper we apply Machine Learning (ML) techniques on static features that are
extracted from Android's application files for the classification of the files. Features are …

The influence of information overload on the development of trust and purchase intention based on online product reviews in a mobile vs. web environment: an …

CP Furner, RA Zinko - Electronic Markets, 2017 - Springer
Abstract Information overload has been studied extensively by decision science
researchers, particularly in the context of task-based optimization decisions. Media selection …

On the need for different security methods on mobile phones

N Ben-Asher, N Kirschnick, H Sieger, J Meyer… - Proceedings of the 13th …, 2011 - dl.acm.org
Mobile phones are rapidly becoming small-size general purpose computers, so-called
smartphones. However, applications and data stored on mobile phones are less protected …

Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention

D Wu, GD Moody, J Zhang, PB Lowry - Information & Management, 2020 - Elsevier
The explosive global adoption of mobile applications (ie, apps) has been fraught with
security and privacy issues. App users typically have a poor understanding of information …

Deep android malware detection and classification

R Vinayakumar, KP Soman… - … on advances in …, 2017 - ieeexplore.ieee.org
Long short-term memory recurrent neural network (LSTM-RNN) have witnessed as a
powerful approach for capturing long-range temporal dependencies in sequences of …

Smartphone information security awareness: A victim of operational pressures

S Allam, SV Flowerday, E Flowerday - Computers & Security, 2014 - Elsevier
Smartphone information security awareness describes the knowledge, attitude and
behaviour that employees apply to the security of the organisational information that they …