Results 1 to 10 of about 110,468 (25)
Mobile device users' susceptibility to phishing attacks [PDF]
The mobile device is one of the fasted growing technologies that is widely used in a diversifying sector. Mobile devices are used for everyday life, such as personal information exchange - chatting, email, shopping, and mobile banking, contributing to information security threats. Users' behavior can influence information security threats.
arxiv +1 more source
Multidevice mobile sessions: A first look [PDF]
The increasing number of users with multiple mobile devices underscores the importance of understanding how users interact, often simultaneously, with these multiple devices. However, most device based monitoring studies have focused only on a single device type.
arxiv +1 more source
Phishing Techniques in Mobile Devices [PDF]
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments.
arxiv +1 more source
Challenges in Mobile Multi-Device Ecosystems [PDF]
Coordinated multi-display environments from the desktop, second-screen to gigapixel display walls are increasingly common. Personal and intimate mobile and wearable devices such as head-mounted displays, smartwatches, smartphones and tablets are rarely part of such multi-device ecosystems.
arxiv +1 more source
Empirical Characterization of Mobility of Multi-Device Internet Users [PDF]
Understanding the mobility of humans and their devices is a fundamental problem in mobile computing. While there has been much work on empirical analysis of human mobility using mobile device data, prior work has largely assumed devices to be independent and has not considered the implications of modern Internet users owning multiple mobile devices ...
arxiv
Towards Around-Device Interaction using Corneal Imaging [PDF]
Around-device interaction techniques aim at extending the input space using various sensing modalities on mobile and wearable devices. In this paper, we present our work towards extending the input area of mobile devices using front-facing device-centered cameras that capture reflections in the human eye.
arxiv +1 more source
The effect of the number of mobile nodes on varying speeds of manets [PDF]
Mobile Ad hoc Networks are dynamic networks populated by mobile devices, or mobile nodes.The Mobile Nodes are free to move anywhere and at any time. The population of the nodes may have some influence on the mobility rate of the mobile nodes. This paper presents simulation results using Matrix Laboratory software.
arxiv +1 more source
Malware detection techniques for mobile devices [PDF]
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications are also increasing in their complexity and performance to cover most needs of their users.
arxiv
Deep Feature-based Face Detection on Mobile Devices [PDF]
We propose a deep feature-based face detector for mobile devices to detect user's face acquired by the front facing camera. The proposed method is able to detect faces in images containing extreme pose and illumination variations as well as partial faces.
arxiv
Mobile Phone Forensics: An Investigative Framework based on User Impulsivity and Secure Collaboration Errors [PDF]
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how mobile users respond to social engineering attacks conducted via mobile devices. The results of this experiment outline a guided mobile phone forensics investigation method which could facilitate the work of digital forensics investigators while analysing
arxiv