Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

BYOD security issues: A systematic literature review

M Ratchford, O El-Gayar, C Noteboom… - … Security Journal: A …, 2022 - Taylor & Francis
Organizations are exposed to new security risks when they allow employees' personal
mobile devices to access the network and the corporate data (a phenomenon called 'Bring …

A Bring Your Own Device security awareness survey among professionals

G Petihakis, D Kiritsis, A Farao, P Bountakas… - Proceedings of the 18th …, 2023 - dl.acm.org
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …

Device-invisible two-factor authenticated key agreement protocol for BYOD

J Ni, X Lin, K Zhang, Y Yu… - 2016 IEEE/CIC …, 2016 - ieeexplore.ieee.org
“Bring Your Own Device”(BYOD) allows employees to bring their own mobile devices to their
workplace and use them to access corporate information and applications. However, BYOD …

Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation

Y Cheng, Y Du, J Peng, J Fu, B Liu - … 2018, Beijing, China, August 14–16 …, 2019 - Springer
With the rapid development of network technologies, such as mobile Internet, Internet of
Things (IoT), secure accessing is becoming an important issue. Security protection …

Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance

A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …

A Security Framework Design for Generating Abnormal Activities Report of Bring Your Own Devices (BYODs)

GS Sushil, RK Deshmukh, AA Junnarkar - International Conference on …, 2022 - Springer
Abstract BYOD (Bring Your Own Device) is an idea which many organisations have lately
implemented on personal cell phones that are utilised at working places. As a result, MDM …

BYOD-Insure: A Security Assessment Model for Enterprise BYOD

M Ratchford - 2020 - scholar.dsu.edu
As organizations continue allowing employees to use their personal mobile devices to
access the organizations' networks and the corporate data, a phenomenon called 'Bring …

[PDF][PDF] Beadle Schola r

M Ratchford, Y Wang, C Noteboom, OF El-Gayar - Information Systems, 2020 - core.ac.uk
BYOD-Insure: A Security Assessment Model for Enterprise BYOD Page 1 Dakota State University
Beadle Scholar Masters Theses & Doctoral Dissertations Spring 4-2020 BYOD-Insure: A Security …

[PDF][PDF] Trusted Secure Accessing Protection Framework Based on Cloud-Channel-Device Cooperation

B Liu - Cyber Security, 2019 - library.oapen.org
With the rapid development of network technologies, such as mobile Internet, Internet of
Things (IoT), secure accessing is becoming an important issue. Security protection …