Search Results - "mobile security"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Mobile security and privacy in smartphone technology by Ibrahim, Mohamed, Supayah, Ganesin, Ibrahim, Jamaludin

    Published 2015
    “…However, in this paper we highlighted mobile phone security and recommendation for mobile security.…”
    Get full text
    Get full text
  2. 2
  3. 3

    The influence of user mobility in mobile virus propagation: An enterprise mobile security perspective by Sudin, Suhizaz, Ahmad, R Badlishah, Al Hadi, Azremi Abdullah, Phak, Len Eh Kan, Syed Idrus, Syed Zulkarnain, Abdullah, Mohd Mustafa AlBakri

    Published 2015
    “…In this paper, the authors review the usage of mobile devices in the enterprise and also the major impact from the infected mobile devices.Then the authors highlight the virus threat to enterprise mobile security and how critical the problems are.The authors then discuss the mobile virus infection dynamics which are the Bluetooth infections, mobile emails infections and mobile internet infections which are the threats to the enterprise mobile security. …”
    Get full text
  4. 4

    New Lightweight Identity Based Encryption Algorithm for Mobile Device: Preliminary Study by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2012
    “…Recently the importance of mobile security coincides with the development of mobile computing. …”
    Get full text
    Get full text
  5. 5

    Mobile embedded system: Your door key evolved with your smartphone - A user evaluation of a two-factor authentication by Teh, P., Ling, Huo Chong, Cheong, S., Ahmed, P.

    Published 2015
    “…New insights for researchers and business world interested in the unified solutions for NFCcompatible smartphone, access control and mobile security are provided.…”
    Get full text
  6. 6

    Secure scheme for user authentication and authorization in android environment by Dar, Humaira, Al-Khateeb, Wajdi Fawzi Mohammed, Habaebi, Mohamed Hadi

    Published 2013
    “…However, due to various lethal threats on mobile security systems, it can be said that existing security is not sufficient. …”
    Get full text
    Get full text
  7. 7

    Android: S-Based Technique in Mobile Malware Detection by Rahiwan Nazar, Romli, Mohamad Fadli, Zolkipli, Ali, Al Fahim Mubarak, Muhammed Ramiza, Ramli

    Published 2018
    “…Mobile malware is a serious threat in mobile security. Malware detector is the primary tool and first defense to protect mobile device against mobile malware. …”
    Get full text
    Get full text
  8. 8

    Cooperative network behavior analysis model for mobile HTTP botnet detection / Meisam Eslahi by Eslahi, Meisam

    Published 2017
    “…On the other hand, mobile devices are not well protected compared to computers and their users pay less attention to security updates and solutions , therefore, these new capabilities (e.g. high internet speed and processing power) have motivated the attackers to migrate to mobile infrastructures. Thus, mobile security has become a crucial issue in BYOD or Bring Your Own Device as the employees use their own mobile devices to access an organization data and systems. …”
    Get full text
  9. 9

    Development and analysis of face recognition system on a mobile robot environment / Jit Shen Quah and Mariam Md Ghazaly by Jit, Shen Quah, Md Ghazaly, Mariam

    Published 2018
    “…However it is apparent that as technology advances, even more so in the direction of mobile robots such as a mobile security surveillance robot or a humanoid robot, the application of face recognition would need to transition from the traditional fixed position recognition to a mobile environment recognition as well. …”
    Get full text
  10. 10

    An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices by Alomari, Mohammad Ahmed Mohammad

    Published 2017
    “…The vast spread and increased capabilities of these devices have come with major challenges to mobile security and data confidentiality. Every year different threats against sensitive data resting inside the storage of these mobile devices continue to rise sharply. …”
    Get full text
    Get full text
  11. 11

    Fog computing, applications , security and challenges, review by Rahman, Gohar, Chai, Chuah Wen

    Published 2018
    “…Fog computing cannot only provide low latency, location awareness but also enhance real-time applications, quality of services, mobility, security and privacy in the internet of things applications scenarios. …”
    Get full text
  12. 12

    Investigation of internet of things handover process for information centric networking and proxy mobile internet protocol by Mohd Aman, Azana Hafizah, Hassan, Rosilah, Hassan Abdalla Hashim, Aisha, Mohd Ramli, Huda Adibah

    Published 2019
    “…This reason has motivated proposals to develop solutions that can overcome existing issues of limitations for mobility, security, reliability and scalability of IoT. …”
    Get full text
    Get full text