Mobile phishing attacks and defence mechanisms: State of art and open research challenges

D Goel, AK Jain - Computers & Security, 2018 - Elsevier
Phishing is an online identity theft in which an attacker tries to steal user's personal
information, resulting in financial loss of individuals as well as organisations. Nowadays …

Smartphone malware and its propagation modeling: A survey

S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …

Internet of Things in healthcare: Interoperatibility and security issues

LMR Tarouco, LM Bertholdo… - 2012 IEEE …, 2012 - ieeexplore.ieee.org
Internet of Things devices being used now expose limitations that prevent their proper use in
healthcare systems. Interoperability and security are especially impacted by such limitations …

Mobile security: Threats and best practices

P Weichbroth, Ł Łysik - Mobile Information Systems, 2020 - Wiley Online Library
Communicating mobile security threats and best practices has become a central objective
due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this …

Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Survey on threats and attacks on mobile networks

S Mavoungou, G Kaddoum, M Taha, G Matar - IEEE Access, 2016 - ieeexplore.ieee.org
Since the 1G of mobile technology, mobile wireless communication systems have continued
to evolve, bringing into the network architecture new interfaces and protocols, as well as …

An in-depth analysis of Android malware using hybrid techniques

AT Kabakus, IA Dogru - Digital Investigation, 2018 - Elsevier
Android malware is widespread despite the effort provided by Google in order to prevent it
from the official application market, Play Store. Two techniques namely static and dynamic …

Unmanned aerial vehicle smart device ground control station cyber security threat model

K Mansfield, T Eveleigh, TH Holzer… - 2013 IEEE International …, 2013 - ieeexplore.ieee.org
The Department of the Defense has transitioned smart devices into the battlefield as a
portable hand-held unmanned aerial vehicle ground control station without adequate cyber …

Attack and system modeling applied to IoT, cloud, and mobile ecosystems: Embedding security by design

JBF Sequeiros, FT Chimuco, MG Samaila… - ACM Computing …, 2020 - dl.acm.org
Over the years, pervasive computing and communication technologies have enabled the
emergence of new computing paradigms that have gained importance across a wide …

Automatically attributing mobile threat actors by vectorized ATT&CK matrix and paired indicator

K Kim, Y Shin, J Lee, K Lee - Sensors, 2021 - mdpi.com
During the past decade, mobile attacks have been established as an indispensable attack
vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the …