Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention
@article{Srivastava2019SmartphoneTS, title={Smartphone Triggered Security Challenges - Issues, Case Studies and Prevention}, author={Saurabh Ranjan Srivastava and Sachin Dube and Gulshan Shrivastaya and Kavita Sharma}, journal={Cyber Security in Parallel and Distributed Computing}, year={2019} }
11 Citations
A QOS ESTIMATION ALGORITHM FROM CALLER RINGTONE ANALYSIS IN GSM NETWORK
- Computer ScienceInternational Journal of Software Engineering and Computer Systems
- 2022
The proposed algorithm was able to compute the QoS using Caller Ringtone only, thus independent of MNP, and an error margin of less than 5 % was observed when the developed technique was compared to the ground truth.
Android application behavioural analysis for data leakage
- Computer ScienceExpert Syst. J. Knowl. Eng.
- 2021
A novel algorithm is proposed to identify the malware‐based applications by probing the permission patterns by using the k‐means algorithm to quarantine the malware application by obtaining permission clusters and substantiates the use of application permissions for potential applications in android malware detection.
A NEOTERIC SMART AND SUSTAINABLE FARMING ENVIRONMENT INCORPORATING BLOCKCHAIN‐BASED ARTIFICIAL INTELLIGENCE APPROACH
- Computer Science
- 2020
APPLICATIONS WITH BLOCKCHAIN TECHNIQUE
- MathematicsCryptocurrencies and Blockchain Technology Applications
- 2020
Adolescents living with food allergies in select global cities: Does a WhatsApp-based mindful eating intervention promote wellbeing and enhance their self-concept?
- Medicine, PsychologyJournal of pediatric nursing
- 2020
BLOCKCHAIN IN SOCIAL NETWORKING
- Computer ScienceCryptocurrencies and Blockchain Technology Applications
- 2020
D-FAP: Dual-Factor Authentication Protocol for Mobile Cloud Connected Devices
- Computer ScienceJ. Sens. Actuator Networks
- 2020
An overview of MCC authentication protocols is presented and a Dual-Factor Authentication Protocol for MCC devices (D-FAP) is proposed, which aims at increasing authentication security by using multi-factors while offloading computation to the cloud to reduce battery consumption.
Enhanced Approach for Android Malware Detection
- Computer Science
- 2020
An enhanced model is also proposed to identify malware applications, inspired by the web crawler technique, to secure the ignorable overhead on the device and provide highly accurate repackaged version detection of a known app.
References
SHOWING 1-10 OF 22 REFERENCES
Click Fraud Detection In Mobile Ads Served In Programmatic Exchanges
- Business
- 2016
Programmatic inventory auction or Real Time Bidding is the latest buzz in the mobile advertisement industry and detecting advertisements that auto click becomes very important for a programmatic exchange that conducts these auctions.
Mobile Phishing Attacks and Mitigation Techniques
- Computer Science
- 2015
This paper discusses various phishing attacks using mobile devices followed by some discussion on countermeasures to bring more awareness to emerging mobile device-based phishingattacks.
WhatsApp network forensics: Decrypting and understanding the WhatsApp call signaling messages
- Computer ScienceDigit. Investig.
- 2015
Determinants of Mobile Apps' Success: Evidence from the App Store Market
- BusinessJ. Manag. Inf. Syst.
- 2014
It is found that broadening app offerings across multiple categories is a key determinant that contributes to a higher probability of survival in the top charts, and sellers must utilize the natural segmentation in consumer tastes offered by the different categories to improve sales performance.
A Survey on Security for Mobile Devices
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2013
This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications, based upon the detection principles, architectures, collected data and operating systems.
Investigating app store ranking algorithms using a simulation of mobile app ecosystems
- Business2013 IEEE Congress on Evolutionary Computation
- 2013
Results show that the effectiveness of the shop front is highly dependent on the speed at which content is updated, and the effects of different app ranking algorithms for the Top Apps Chart and the frequency of updates of the New Apps Chart on the download-to-browse ratio.
Mobile Security: A Look Ahead
- Computer ScienceIEEE Security & Privacy
- 2013
An overview of the current threats based on data collected from observing the interaction of 75 million users with the Internet is provided, giving an insight into what threats wait on the horizon.
Phishing detection taxonomy for mobile device
- Computer Science
- 2013
This paper addresses the current trend phishing detection for mobile device and identifies significant criterion to improve phishing Detection techniques on mobile device.
Addressing Security and Privacy Risks in Mobile Applications
- Computer ScienceIT Professional
- 2012
Applications for mobile platforms are being developed at a tremendous rate, but often without proper security implementation, causing serious information security and data privacy issues and can have severe repercussions on users and organizations alike.
BYOD: Security and Privacy Considerations
- Computer ScienceIT Professional
- 2012
Clearly, there are several important advantages for employees and employers when employees bring their own devices to work. But there are also significant concerns about security privacy. Companies…