Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - Computers & Security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

Multi-agent systems and complex networks: Review and applications in systems engineering

M Herrera, M Pérez-Hernández, A Kumar Parlikad… - Processes, 2020 - mdpi.com
Systems engineering is an ubiquitous discipline of Engineering overlapping industrial,
chemical, mechanical, manufacturing, control, software, electrical, and civil engineering. It …

Machine learning based mobile malware detection using highly imbalanced network traffic

Z Chen, Q Yan, H Han, S Wang, L Peng, L Wang… - Information …, 2018 - Elsevier
In recent years, the number and variety of malicious mobile apps have increased drastically,
especially on Android platform, which brings insurmountable challenges for malicious app …

Authentication in mobile cloud computing: A survey

M Alizadeh, S Abolfazli, M Zamani, S Baharun… - Journal of Network and …, 2016 - Elsevier
Mobile cloud computing (MCC) is the state-of-the-art mobile distributed computing model
that incorporates multitude of heterogeneous cloud-based resources to augment …

Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

Social media-related cybercrimes and techniques for their prevention

TR Soomro, M Hussain - Applied Computer Systems, 2019 - sciendo.com
Since a past decade, social media networking has become an essential part of everyone's
life affecting cultural, economic and social life of the people. According to internetlivestats …

Modern security threats in the Internet of Things (IoT): Attacks and Countermeasures

G Rajendran, RSR Nivash, PP Parthy… - 2019 International …, 2019 - ieeexplore.ieee.org
The Internet of Things (IoT) is the emerging network of hardware and software components
connected to daily life activities for bringing reliability and convenience. The network mostly …

An empirical study of cross‐platform mobile development in industry

A Biørn-Hansen, TM Grønli, G Ghinea… - Wireless …, 2019 - Wiley Online Library
The purpose of this study is to report on the industry's perspectives and opinions on cross‐
platform mobile development, with an emphasis on the popularity, adoption, and arising …

Taxonomy of mobile users' security awareness

R Bitton, A Finkelshtein, L Sidi, R Puzis, L Rokach… - Computers & …, 2018 - Elsevier
The popularity of smartphones, coupled with the amount of valuable and private information
they hold, make them attractive to attackers interested in exploiting the devices to harvest …

Permission-based malware detection system for android using machine learning techniques

RS Arslan, İA Doğru, N Barişçi - International journal of software …, 2019 - World Scientific
Mobile applications create their own security and privacy models through permission-based
models. Some applications may request extra permissions that they do not need but may …