BYOD security: A new business challenge

K Downer, M Bhattacharya - 2015 IEEE International …, 2015 - ieeexplore.ieee.org
Bring Your Own Device (BYOD) is a rapidly growing trend in businesses concerned with
information technology. BYOD presents a unique list of security concerns for businesses …

[PDF][PDF] Social distancing: Role of smartphone during coronavirus (COVID-19) pandemic era

H Wanga, T Joseph, MB Chuma - International Journal of Computer …, 2020 - academia.edu
In December 2019, an outbreak of severe acute respiratory syndrome coronavirus 2
(SARSCoV-2) infection occurred in Wuhan, Hubei Province, China and spread across China …

Mobile offloading in the wild: Findings and lessons learned through a real-life experiment with a new cloud-aware system

MV Barbera, S Kosta, A Mei, VC Perta… - IEEE INFOCOM 2014 …, 2014 - ieeexplore.ieee.org
Mobile-cloud offloading mechanisms delegate heavy mobile computation to the cloud. In
real life use, the energy tradeoff of computing the task locally or sending the input data and …

T2Droid: A TrustZone-based dynamic analyser for Android applications

SD Yalew, GQ Maguire, S Haridi… - 2017 ieee trustcom …, 2017 - ieeexplore.ieee.org
Android has become the most widely used mobile operating system (OS) in recent years.
There is much research on methods for detecting malicious Android applications. Dynamic …

Factors for consideration when developing a bring your own device (BYOD) strategy in higher education

S Emery - 2012 - scholarsbank.uoregon.edu
The consumerization of IT changes the way in which IT departments must plan for and
manage technology. This annotated bibliography presents factors for consideration by IT …

Smartdog: Real-time detection of smartphone theft

S Chang, T Lu, H Song - … on Internet of Things (iThings) and …, 2016 - ieeexplore.ieee.org
With the enhanced computing capabilities and a wide variety of functions available on
smartphones, critical and sensitive information, such as contact lists, messages, schedules …

Security methods against potential physical attacks on smartphones

SJ Alsunaidi, AM Almuhaideb - 2019 2nd International …, 2019 - ieeexplore.ieee.org
The rapid growth in communications development has made devices intelligent, efficient
and convenient to accomplish many of our daily tasks, where they became an integral part of …

A strong smartphone authentication model to control cellular network access using blockchain

SJ Alsunaidi, AM Almuhaideb - Wireless networks, 2021 - Springer
In an era that requests facilitating access to most services by providing the online platforms,
the need to own a small electronic device is increasing. The smartphone is the ideal choice …

IMEI-based Mobile Device Tracking and Stolen Phone Identification System

N Mandela, T Wangchuk, T Mbinda… - … on Computing for …, 2024 - ieeexplore.ieee.org
Mobile device theft is a pervasive issue with serious implications for individuals and society.
The rapid proliferation of smartphones, accompanied by their enhanced computing …

Mobile device security with ARM TrustZone

SD Yalew - 2018 - diva-portal.org
Mobile devices such as smartphones are becoming the majority of computing devices due to
their evolving capabilities. Currently, service providers such as financial and healthcare …