Comparative analysis of Android and iOS from security viewpoint

S Garg, N Baliyan - Computer Science Review, 2021 - Elsevier
Smartphone usage has increased exponentially in the recent years. Android and iOS are the
most popular smartphone platforms, while the ease of use along with the computational …

[HTML][HTML] Fool me once: A systematic review of techniques to authenticate digital artefacts

C Neale - Forensic Science International: Digital Investigation, 2023 - Elsevier
When conducting digital forensic investigations, practitioners are concerned with
understanding whether the digital artefacts they encounter are authentic and have not been …

Forensic analysis of Twitch video streaming activities on Android

A AlZahrani, MA Wani, WA Bhat - Journal of Forensic Sciences, 2021 - Wiley Online Library
Video streaming abuses range from copyright infringement and piracy to child sexual abuse
and murder. This paper performs proactive forensics of Twitch video streaming activities on …

Usability, Reliability, Security, and Status: Unpacking the Factors Shaping User Choice between iOS and Android in Saudi Arabia

AAH Alzahrani - European Journal of Information Technologies and …, 2024 - ej-compute.org
This investigation delves into user perceptions of iOS and Android operating systems within
the Kingdom of Saudi Arabia. A sample of 594 participants was recruited to explore their …

CNA tactics and techniques: a structure proposal

A Villalón-Huerta, I Ripoll-Ripoll… - Journal of Sensor and …, 2021 - mdpi.com
Destructive and control operations are today a major threat for cyber physical systems.
These operations, known as Computer Network Attack (CNA), and usually linked to state …

Android vs. IOS: a comparative analysis over mobile operator infrastructures based on crowdsourced mobile dataset

E Zeydan - Telecommunication Systems, 2021 - Springer
User equipment (UE)'s operating system (OS) and category types are important factors that
are affecting the end-user performance in a given mobile network operator (MNO)'s …

[图书][B] Mobile OS Vulnerabilities: Quantitative and Qualitative Analysis

S Garg, N Baliyan - 2023 - taylorfrancis.com
This is book offers in-depth analysis of security vulnerabilities in different mobile operating
systems. It provides methodology and solutions for handling Android malware and …

Modeling of advanced threat actors: characterization, categorization and detection

A Villalón Huerta - 2023 - riunet.upv.es
[EN] Information and its related technologies are a critical asset to protect for people,
organizations and even whole countries. Our dependency on information technologies …

Classifying the authenticity of evaluated smartphone data

H Pieterse, M Olivier, R Van Heerden - … in Digital Forensics XV: 15th IFIP …, 2019 - Springer
Advances in smartphone technology coupled with the widespread use of smartphones in
daily activities create large quantities of smartphone data. This data becomes increasingly …

[PDF][PDF] Detection of Cyber Attacks on Android and IOS

SH Kailas - 2020 - academia.edu
Cyberattacks are the biggest problem in today's scenario. It interrupts the mobile apps and
hacks networks. People are widely using online payment which is risky nowadays because …