A data-centric model for smartphone security
Recently the usage of mobile devices has increased rapidly and it will be growing even more with enhancements in mobile device's functionality. Due to their enhanced functionality, mobile devices are used in corporate businesses and carry valuable information such as corporate transactions. So...
| Main Authors: | Dezfouli, Farhood Norouzizadeh, Dehghantanha, Ali, Mahmod, Ramlan, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Advanced Institute of Convergence Information Technology
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/30592/ http://psasir.upm.edu.my/id/eprint/30592/1/A%20data.pdf |
Similar Items
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
by: Dezfouli, Farhood Norouzizadeh
Published: (2016)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Towards secure model for SCADA systems
by: Daryabar, Farid, et al.
Published: (2012)
by: Daryabar, Farid, et al.
Published: (2012)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Forensics investigation challenges in cloud computing environments
by: Damshenas, Mohsen, et al.
Published: (2012)
by: Damshenas, Mohsen, et al.
Published: (2012)
Model-based system architecture for preventing XPath injection in database-centric web services environment
by: Asmawi, Aziah, et al.
Published: (2012)
by: Asmawi, Aziah, et al.
Published: (2012)
XIPS : a model-based prevention mechanism for preventing blind XPath injection in database-centric web services environment.
by: Asmawi, Aziah, et al.
Published: (2013)
by: Asmawi, Aziah, et al.
Published: (2013)
A novel authentication scheme to increase security for non-repudiation of users
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
Design and implementation of multi factor mechanism for secure authentication system
by: Hussein, Khalid Waleed, et al.
Published: (2013)
by: Hussein, Khalid Waleed, et al.
Published: (2013)
A secured and efficient multi-factor biometric authentication scheme using plan recognition technique
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2016)
Cloud computing and conflicts with digital forensic investigation
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
Avian-centric design
by: Abdul Shukor, Shureen Faris
Published: (2015)
by: Abdul Shukor, Shureen Faris
Published: (2015)
Adaptive data communication interface: a user-centric visual data interpretation framework
by: Figueredo, Grazziela P., et al.
Published: (2015)
by: Figueredo, Grazziela P., et al.
Published: (2015)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Can academic librarians as data scientists revolutionise user-centric e-learning?
by: Sa'ari, Haziah, et al.
Published: (2023)
by: Sa'ari, Haziah, et al.
Published: (2023)
Mobile forensic data acquisition in Firefox OS
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
by: Yusoff, Mohd Najwadi, et al.
Published: (2014)
Performance measurement for mobile forensic data acquisition in Firefox OS
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
by: Yusoof, Mohd Najwadi, et al.
Published: (2014)
Security Management Model for Mobile Databases Transaction Management
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
by: Ziyad. T., Abdul-Mehdi, et al.
Published: (2008)
Software certification modeling: from technical to user centric approach
by: Yahaya, Jamaiah, et al.
Published: (2013)
by: Yahaya, Jamaiah, et al.
Published: (2013)
Visual and semantic context modeling for scene-centric image annotation
by: Zand, Mohsen, et al.
Published: (2015)
by: Zand, Mohsen, et al.
Published: (2015)
Smartphone-based robot control for localisation
by: Nik Mahmod, Nik Firdaus
Published: (2015)
by: Nik Mahmod, Nik Firdaus
Published: (2015)
Ethical dimensions of user centric regulation
by: Urquhart, Lachlan
Published: (2017)
by: Urquhart, Lachlan
Published: (2017)
Privacy Preservation Model For Data Exposure In Android Smartphone Usage
by: Abu Bakar, Anizah
Published: (2021)
by: Abu Bakar, Anizah
Published: (2021)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
A survey on cyber-crime prediction techniques
by: Shaerpour, Kaveh, et al.
Published: (2013)
by: Shaerpour, Kaveh, et al.
Published: (2013)
A survey on malware propagation, analysis, and detection
by: Damshenas, Mohsen, et al.
Published: (2013)
by: Damshenas, Mohsen, et al.
Published: (2013)
Empowering rural economies: a community-centric sustainable ecotourism model
by: Teruki, Neilson
Published: (2024)
by: Teruki, Neilson
Published: (2024)
Citizen-centric demand model for transformational government / Kamalia Azma Kamaruddin
by: Kamaruddin, Kamalia Azma
Published: (2018)
by: Kamaruddin, Kamalia Azma
Published: (2018)
A formal veriļ¬cation and simulation of Common Criteria Recognition Arrangement (CCRA)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
User-centric learning for multiple access selections
by: Dzulkifli, Sumayyah, et al.
Published: (2019)
by: Dzulkifli, Sumayyah, et al.
Published: (2019)
Towards an Ontology for Geospatial User-centric Metadata
by: Ziaimatin, H., et al.
Published: (2018)
by: Ziaimatin, H., et al.
Published: (2018)
'People - centric' projects to cushion oil shocks
Published: (2009)
Published: (2009)
Comparison Of Smartphones Using Data Envelopment Analysis.
by: Mustafa, Adli, et al.
Published: (2005)
by: Mustafa, Adli, et al.
Published: (2005)
Similar Items
-
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012) -
Analytical method for forensic investigation of social networking applications on smartphones
by: Dezfouli, Farhood Norouzizadeh
Published: (2016) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011) -
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013) -
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)