An Overview of using of Artificial Intelligence in Enhancing Security and Privacy in Mobile Social Networks

HN Fakhouri, S Alawadi, FM Awaysheh… - … Conference on Fog …, 2023 - ieeexplore.ieee.org
Mobile Social Networks (MSNs) have emerged as pivotal platforms for communication,
information dissemination, and social connection in contemporary society. As their …

[HTML][HTML] Bot-DM: A dual-modal botnet detection method based on the combination of implicit semantic expression and graphical expression

G Wu, X Wang, Q Lu, H Zhang - Expert Systems with Applications, 2024 - Elsevier
A botnet is a group of hijacked devices that conduct various cyberattacks, which is one of the
most dangerous threats on the internet. Individuals or organizations can effectively detect …

Does the improvement of public Wi-Fi technology undermine mobile network operators' profits? Evidence from consumer preferences

M Oh, J Kim, J Shin - Telematics and Informatics, 2022 - Elsevier
Cellular data consumption by users is the main revenue source for mobile network operators
(MNOs). On the one hand, technological development and expansion in Wi-Fi coverage can …

Exploring age-related patterns in internet access: Insights from a secondary analysis of New Zealand survey data

E Pacheco - arXiv preprint arXiv:2310.03252, 2023 - arxiv.org
For over two decades Internet access has been a topic of research and debate. Up-to-date
evidence about key predictors such as age is important considering not only the …

Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networks

M Sangeen, NA Bhatti, K Kifayat, AA Alsadhan… - Computer …, 2023 - Elsevier
The use of public wireless access points (APs) has likely increased with the rise of wireless
devices such as smartphones, tablets, smartwatches, etc. These devices make it easy for …

Why do people use public Wi-Fi?: An investigation of risk-taking behaviour and factors lead to decisions

M Abdulkader - 2023 - diva-portal.org
The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times,
providing convenient connectivity in various public areas. Public wireless networks are now …

An Experiment to Prevent Malicious Actors from Compromising Private Digital Assets Over a Public Network

F Hartanto, B Budiman, E Gwei… - Engineering …, 2024 - journal.binus.ac.id
In the current millennium, human society has immensely improved its ability to obtain and
distribute information. This change on the other hand, has caused the majority of daily …

DroidSecTester: Towards context-driven modelling and detection of Android application vulnerabilities

I Baheux, MEA Tebib, M Graa, P Andre… - 2023 IEEE 34th …, 2023 - ieeexplore.ieee.org
In the dynamic Android application security landscape, traditional vulnerability assessment
faces challenges posed by the increasing complexity of execution environments. These …

Revolusi Ruang Hidup dengan Teknologi Smart Home

M Armiwaty, RT Idrus… - SEMINAR NASIONAL DIES …, 2023 - journal.unm.ac.id
Dalam beberapa tahun terakhir, telah terjadi peningkatan yang signifikan dalam adopsi
teknologi smart home. Mulai dari asisten suara seperti Amazons Alexa dan google home …

Implementation of policies in Data-Centric Security Solutions: A Case Study

L Ponchione - 2023 - webthesis.biblio.polito.it
Implementation of policies in Data-Centric Security Solutions: A Case Study One of the most
crucial aspects that a company must take into account is the data it has to manage. So as …