Results 1 to 10 of about 110,468 (25)

Mobile device users' susceptibility to phishing attacks [PDF]

open access: yesIJCSIT 1 (2022) 1-18, 2022
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange - chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats.
arxiv   +1 more source

Multidevice mobile sessions: A first look [PDF]

open access: yesB. Finley, T. Soikkeli, Multidevice mobile sessions: A first look, Pervasive and Mobile Computing, Volume 39, 2017, Pages 267-283, 2018
The increasing number of users with multiple mobile devices underscores the importance of understanding how users interact, often simultaneously, with these multiple devices. However, most device based monitoring studies have focused only on a single device type.
arxiv   +1 more source

Phishing Techniques in Mobile Devices [PDF]

open access: yesJournal of Computer and Communications JCC, vol 6 no 2 , 2018, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments.
arxiv   +1 more source

Challenges in Mobile Multi-Device Ecosystems [PDF]

open access: yesmUX: The Journal of Mobile User Experience, 5(1), 1-22, 2016, 2016
Coordinated multi-display environments from the desktop, second-screen to gigapixel display walls are increasingly common. Personal and intimate mobile and wearable devices such as head-mounted displays, smartwatches, smartphones and tablets are rarely part of such multi-device ecosystems.
arxiv   +1 more source

Empirical Characterization of Mobility of Multi-Device Internet Users [PDF]

open access: yesarXiv, 2020
Understanding the mobility of humans and their devices is a fundamental problem in mobile computing. While there has been much work on empirical analysis of human mobility using mobile device data, prior work has largely assumed devices to be independent and has not considered the implications of modern Internet users owning multiple mobile devices ...
arxiv  

Towards Around-Device Interaction using Corneal Imaging [PDF]

open access: yes, 2017
Around-device interaction techniques aim at extending the input space using various sensing modalities on mobile and wearable devices. In this paper, we present our work towards extending the input area of mobile devices using front-facing device-centered cameras that capture reflections in the human eye.
arxiv   +1 more source

The effect of the number of mobile nodes on varying speeds of manets [PDF]

open access: yesInternational Journal of Network Security & Its Applications (IJNSA), Vol.4, No.6, November 2012, 2012
Mobile Ad hoc Networks are dynamic networks populated by mobile devices, or mobile nodes.The Mobile Nodes are free to move anywhere and at any time. The population of the nodes may have some influence on the mobility rate of the mobile nodes. This paper presents simulation results using Matrix Laboratory software.
arxiv   +1 more source

Malware detection techniques for mobile devices [PDF]

open access: yesInternational Journal of Mobile Network Communications & Telematics ( IJMNCT), vol 7, 2015, 2018
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most needs of their users.
arxiv  

Deep Feature-based Face Detection on Mobile Devices [PDF]

open access: yesarXiv, 2016
We propose a deep feature-based face detector for mobile devices to detect user's face acquired by the front facing camera. The proposed method is able to detect faces in images containing extreme pose and illumination variations as well as partial faces.
arxiv  

Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors [PDF]

open access: yesContemporary Digital Forensic Investigations of Cloud and Mobile Applications, Pages 79-89,Chapter 6, 2017, 2017
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how mobile users respond to social engineering attacks conducted via mobile devices. The results of this experiment outline a guided mobile phone forensics investigation method which could facilitate the work of digital forensics investigators while analysing
arxiv  

Home - About - Disclaimer - Privacy