Mobile health and privacy: cross sectional study

G Tangari, M Ikram, K Ijaz, MA Kaafar, S Berkovsky - bmj, 2021 - bmj.com
Objectives To investigate whether and what user data are collected by health related mobile
applications (mHealth apps), to characterise the privacy conduct of all the available mHealth …

[Retracted] A Comprehensive Review of Android Security: Threats, Vulnerabilities, Malware Detection, and Analysis

S Acharya, U Rawat… - Security and …, 2022 - Wiley Online Library
The popularity and open‐source nature of Android devices have resulted in a dramatic
growth of Android malware. Malware developers are also able to evade the detection …

Flowprint: Semi-supervised mobile-app fingerprinting on encrypted network traffic

T Van Ede, R Bortolameotti, A Continella… - Network and distributed …, 2020 - par.nsf.gov
Mobile-application fingerprinting of network traffic is valuable for many security solutions as
it provides insights into the apps active on a network. Unfortunately, existing techniques …

[HTML][HTML] Network traffic classification for data fusion: A survey

J Zhao, X Jing, Z Yan, W Pedrycz - Information Fusion, 2021 - Elsevier
Traffic classification groups similar or related traffic data, which is one main stream
technique of data fusion in the field of network management and security. With the rapid …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019 - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

“Won't somebody think of the children?” examining COPPA compliance at scale

I Reyes, P Wijesekera, J Reardon… - The 18th Privacy …, 2018 - dspace.networks.imdea.org
We present a scalable dynamic analysis frame-work that allows for the automatic evaluation
of the privacy behaviors of Android apps. We use our system to analyze mobile apps' …

Maps: Scaling privacy compliance analysis to a million apps

S Zimmeck, P Story, D Smullen… - Proceedings on …, 2019 - petsymposium.org
The app economy is largely reliant on data collection as its primary revenue model. To
comply with legal requirements, app developers are often obligated to notify users of their …

Beyond google play: A large-scale comparative study of chinese android app markets

H Wang, Z Liu, J Liang, N Vallina-Rodriguez… - Proceedings of the …, 2018 - dl.acm.org
China is one of the largest Android markets in the world. As Chinese users cannot access
Google Play to buy and install Android apps, a number of independent app stores have …

Deep learning and pre-training technology for encrypted traffic classification: A comprehensive review

W Dong, J Yu, X Lin, G Gou, G Xiong - Neurocomputing, 2024 - Elsevier
Network traffic classification has long been a pivotal topic in network security. In the past two
decades, methods like port-based classification, deep packet inspection, and machine …

Investigating system operators' perspective on security misconfigurations

C Dietrich, K Krombholz, K Borgolte… - Proceedings of the 2018 …, 2018 - dl.acm.org
Nowadays, security incidents have become a familiar" nuisance," and they regularly lead to
the exposure of private and sensitive data. The root causes for such incidents are rarely …