The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The availability of a rich variety of sensors in smart mobile devices has enabled today's software to be situational-aware and to learn about surrounding environment. We explore a novel generation of mobile malware, which utilizes this situational awareness and can attack a mobile device carried by a specific person, or people matching a specific set of criteria. The behavior and threat posed by StuxMob...
The availability of wireless interfaces with the new generation medical devices has spawned numerous opportunities in providing better healthcare support to patients. However, the weaknesses of available wireless communication channels introduce various novel attacks on the medical devices. Since the smart mobile devices, such as smartphones, tablets, laptops are also equipped with the same communication...
In the absence of centralized trusted authorities (CTA), security is one of the foremost concern in Mobile Ad-hoc Networks (MANET) as the network is open to attacks and unreliability in the presence of malicious nodes (devices). With increasing demand of interactions among nodes, trust based information sharing needs more stringent rules to ensure security in this pervasive computing scenario. In...
Cloud computing has become the dominant computing paradigm in recent years. As clouds evolved, researchers have explored the possibility of building clouds out of loosely associated mobile computing devices. However, most such efforts failed due to the lack of a proper incentive model for the mobile device owners. In this paper, we propose CellCloud - a practical mobile cloud architecture which can...
URL blacklisting is a widely used technique for blocking phishing websites. To prepare an effective blacklist, it is necessary to analyze possible threats and include the identified malicious sites in the blacklist. Spam emails are good source for acquiring suspected phishing websites. However, the number of URLs gathered from spam emails is quite large. Fetching and analyzing the content of this...
It is important to preserve the integrity of a product as it is transported through the channel of distribution and delivered to the final consumer. In real world cases, manufacturing plants are sited at different parts of the world. Thus, it is an absolute necessity to have a secure mechanism which allows the supply chain integrity to be preserved. In this paper, we proposed a novel three-way bounded...
A series of new types of frauds and threats have emerged with the increased popularity of smartphones. Studies show that smartphone users are three times more likely to become the victims of identity fraud. Though researchers have developed many well known methods for user authentication in smartphone, little has been done focusing on visually impaired mobile device users. Commonly used username-password...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.