Security‐centric ranking algorithm and two privacy scores to mitigate intrusive apps

F Mohsen, H Abdelhaq, H Bisgin - … and Computation: Practice …, 2022 - Wiley Online Library
Smartphone users are constantly facing the risks of losing their private information to third‐
party mobile applications. Studies have revealed that the vast majority of users either do not …

Countering intrusiveness using new security-centric ranking algorithm built on top of elasticsearch

F Mohsen, H Abdelhaq, H Bisgin, A Jolly… - 2018 17th IEEE …, 2018 - ieeexplore.ieee.org
Mobile computing is dominating the technology market and it is expected to continue
growing. Mobile thirdparty applications without any doubt contribute vastly to this growth …

Harnessing Broadcast Receivers for Classification of Android Malware Threats

N Chrysikos, P Karampelas… - European …, 2024 - papers.academic-conferences.org
With the increasing number of malicious attacks, the way how to detect and classify
malicious apps has drawn attention in mobile technology market. In this paper, we proposed …

Evaluation of mobile vulnerabilities in terms of corporate information security

O Akyıldız, U Yavanoğlu - 2017 International Conference on …, 2017 - ieeexplore.ieee.org
In world one out of two people is using a smart device. These devices those protect the
personal data, those have people do their payments are targeted by attackers. Mobile …

Value-driven learning: Decoding and building upon playful computing education (Invited keynote)

B DiSalvo - 2017 IEEE Symposium on Visual Languages and …, 2017 - computer.org
Mobile computing is dominating the technology market and it is expected to continue
growing. Mobile thirdparty applications without any doubt contribute vastly to this growth …