[HTML][HTML] Design Guidelines for Improving Mobile Sensing Data Collection: Prospective Mixed Methods Study

C Slade, RM Benzo, P Washington - Journal of Medical Internet Research, 2024 - jmir.org
Background Machine learning models often use passively recorded sensor data streams as
inputs to train machine learning models that predict outcomes captured through ecological …

Gaming the system: tetromino-based covert channel and its impact on mobile security

E Vasilellis, V Botsos, A Anagnostopoulou… - International Journal of …, 2024 - Springer
Trojan droppers consistently emerge as challenging malware threats, particularly within the
Android ecosystem. Traditional malware detection approaches focus on identifying payloads …

The access control double bind: How everyday interfaces regulate access and privacy, enable surveillance, and enforce identity

DL Gardner, TJ Tanenbaum - Convergence, 2024 - journals.sagepub.com
Access controls are an inescapable and deceptively mundane requirement for accessing
digital applications and platforms. These systems enable and enforce practices related to …

Press play, install malware: a study of rhythm game-based malware dropping

E Vasilellis, G Gkionis, D Gritzalis - International Journal of Information …, 2024 - Springer
Malware remains a major cybersecurity threat, often evading traditional detection methods.
This study builds on our previous research with Tetris to present a more efficient covert …

Hidden Realms: Exploring Steganography Methods in Games for Covert Malware Delivery

E Vasilellis, A Anagnostopoulou, K Adamos - Malware: Handbook of …, 2024 - Springer
As digital systems continue to evolve, so do the tactics employed by malicious actors.
Studies have shown a rise in smartphone malware over the past decade, posing a threat to …

SoK: Privacy Personalised--Mapping Personal Attributes\& Preferences of Privacy Mechanisms for Shoulder Surfing

H Farzand, K Marky, M Khamis - arXiv preprint arXiv:2411.18380, 2024 - arxiv.org
Shoulder surfing is a byproduct of smartphone use that enables bystanders to access
personal information (such as text and photos) by making screen observations without …

Empowering User Security Awareness and Risk Assessment Within Gamified Smartphone Environment

M Bahrini, J Weglewski, K Sohr, R Malaka - International Conference on …, 2024 - Springer
Smartphones facilitate human needs such as communication, entertainment, and
knowledge. These instruments simultaneously process and store user data, including email …

The connection privacy management model to enhance the communication services for subscriber neighboring cells in Cellular communication

A Gautam, R Sharma - 2022 International Interdisciplinary …, 2022 - ieeexplore.ieee.org
Cellular communication has recently become so firmly established in our everyday life that it
is difficult to imagine modern society without it. Like many great inventions, the mobile phone …

Gaming the system: Tetromino-based covert channels and their impact on mobile security

E Vasilellis, V Botsos, A Anagnostopoulou, D Gritzalis - 2024 - researchsquare.com
Trojan droppers consistently emerge as formidable malware threats, particularly within the
Android ecosystem. Traditional malware detection strategies focus on identifying payloads …

Empowering User Security Awareness

RAW Gamified, M Bahrini, J Weglewski… - … -ICEC 2024: 23rd …, 2024 - books.google.com
Smartphones facilitate human needs such as communication, entertainment, and
knowledge. These instruments simultaneously process and store user data, including email …