Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Mobile security

Known as: Mobile phone security, Mobile Security Strategies, Smartphone security 
Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2016
Highly Cited
2016
Keystroke dynamics is a well-investigated behavioural biometric based on the way and rhythm in which someone interacts with a… Expand
  • table II
  • figure 1
  • figure 3
  • figure 4
Highly Cited
2014
Highly Cited
2014
Today's smartphone operating systems frequently fail to provide users with adequate control over and visibility into how third… Expand
Highly Cited
2013
Highly Cited
2013
We introduce a new mobile system framework, SenSec, which uses passive sensory data to ensure the security of applications and… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Highly Cited
2013
Highly Cited
2013
Touch-based verification --- the use of touch gestures (e.g., swiping, zooming, etc.) to authenticate users of touch screen… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Highly Cited
2013
Highly Cited
2013
We present CoCoSpot, a novel approach to recognize botnet command and control channels solely based on traffic analysis features… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Highly Cited
2012
Highly Cited
2012
Smartphones are very effective tools for increasing the productivity of business users. With their increasing computational power… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Highly Cited
2011
Highly Cited
2011
The fluidity of application markets complicate smartphone security. Although recent efforts have shed light on particular… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Highly Cited
2011
Highly Cited
2011
Smartphone security research has become very popular in response to the rapid, worldwide adoption of new platforms such as… Expand
  • figure 1
Highly Cited
2008
Highly Cited
2008
Modern mobile devices continue to approach the capabilities and extensibility of standard desktop PCs. Unfortunately, these… Expand
  • table 1
  • table 2
  • table 3
  • table 4
Highly Cited
2005
Highly Cited
2005
Covered in: ICS 243G, Ch. 11-16 in Stallings, & Ch. 7, 34 from Cranor-Garfinkel. • Authentication Applications and PKI… Expand