Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods

M Alsaleh, N Alomar, A Alarifi - PloS one, 2017 - journals.plos.org
Protecting smartphones against security threats is a multidimensional problem involving
human and technological factors. This study investigates how smartphone users' security …

A study on web application security and detecting security vulnerabilities

S Kumar, R Mahajan, N Kumar… - 2017 6th International …, 2017 - ieeexplore.ieee.org
The world is exceedingly reliant on the Internet. Nowadays, web security is biggest
challenge in the corporate world. It is considered as the principle framework for the …

An android communication app forensic taxonomy

A Azfar, KKR Choo, L Liu - Journal of forensic sciences, 2016 - Wiley Online Library
Due to the popularity of Android devices and applications (apps), Android forensics is one of
the most studied topics within mobile forensics. Communication apps, such as instant …

A comprehensive overview of government hacking worldwide

CY Li, CC Huang, F Lai, SL Lee, J Wu - IEEE Access, 2018 - ieeexplore.ieee.org
There has been an ongoing and heated public policy debate on the appropriate role of and
limitations to government hacking in maintaining a proper balance of national security and …

Android mobile VoIP apps: a survey and examination of their security and privacy

A Azfar, KKR Choo, L Liu - Electronic Commerce Research, 2016 - Springer
Abstract Voice over Internet Protocol (VoIP) has become increasingly popular among
individuals and business organisations, with millions of users communicating using VoIP …

[图书][B] A conceptual interdisciplinary plug-and-play cyber security framework

KKR Choo - 2014 - Springer
Malicious cyber activities are no longer a matter of if but of when, and in our increasingly
interconnected world, threats to our national sovereignty can come from unexpected sources …

Neutralizing SQL injection attack using server side code modification in web applications

AK Dalai, SK Jena - Security and Communication Networks, 2017 - Wiley Online Library
Reports on web application security risks show that SQL injection is the top most
vulnerability. The journey of static to dynamic web pages leads to the use of database in …

A secure and resilient cross‐domain SIP solution for MANETs using dynamic clustering and joint spatial and temporal redundancy

A Aburumman, WJ Seo, C Esposito… - Concurrency and …, 2017 - Wiley Online Library
In this paper, we extend our earlier work (where we presented a cross‐domain Session
Initiation Protocol solution for mobile ad hoc networks using dynamic clustering) to handle …

A secure cross-domain SIP solution for mobile ad hoc network using dynamic clustering

A Aburumman, WJ Seo, R Islam, MK Khan… - Security and Privacy in …, 2015 - Springer
With the increasingly popularity of mobile devices (eg iPhones and iPads), Mobile Ad hoc
Networks (MANETs) have emerged as a topical research area in recent years, and adapting …

[PDF][PDF] Quality evaluation of mobile networks using VoIP applications: a case study with Skype and LINE based-on stationary tests in Bangkok

P Wuttidittachotti, T Daengsi - International Journal of Computer …, 2015 - mecs-press.org
This paper presents the performance evaluation of 3G mobile networks for one kind of
multimedia application called Voice over IP (VoIP) within Bangkok, the capital city of …