Found: 49
Select item for more details and to access through your institution.
Editorial: special issue on advances in security and privacy for future mobile communications.
- Published in:
- 2019
- By:
- Publication type:
- Editorial
Test for Detection of Weak Graphic Passwords in Passpoint Based on the Mean Distance between Points †.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 5, p. 777, doi. 10.3390/sym13050777
- By:
- Publication type:
- Article
Triple Modular Redundancy Optimization for Threshold Determination in Intrusion Detection Systems.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 557, doi. 10.3390/sym13040557
- By:
- Publication type:
- Article
Two Anatomists Are Better than One—Dual-Level Android Malware Detection.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 7, p. 1128, doi. 10.3390/sym12071128
- By:
- Publication type:
- Article
A State-of-the-Art Review on the Security of Mainstream IoT Wireless PAN Protocol Stacks.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 4, p. 579, doi. 10.3390/sym12040579
- By:
- Publication type:
- Article
Exposing mobile malware from the inside (or what is your mobile app really doing?).
- Published in:
- Peer-to-Peer Networking & Applications, 2014, v. 7, n. 4, p. 687, doi. 10.1007/s12083-012-0179-x
- By:
- Publication type:
- Article
Editorial: special issue on advances in security and privacy for future mobile communications.
- Published in:
- 2015
- By:
- Publication type:
- Editorial
Sharing Pandemic Vaccination Certificates through Blockchain: Case Study and Performance Evaluation.
- Published in:
- Wireless Communications & Mobile Computing, 2021, p. 1, doi. 10.1155/2021/2427896
- By:
- Publication type:
- Article
DEVICE AUTHENTICATION IN WIRELESS AND PERVASIVE ENVIRONMENTS.
- Published in:
- Intelligent Automation & Soft Computing, 2010, v. 16, n. 3, p. 399, doi. 10.1080/10798587.2010.10643089
- By:
- Publication type:
- Article
WPAxFuzz: Sniffing Out Vulnerabilities in Wi-Fi Implementations †.
- Published in:
- Cryptography (2410-387X), 2022, v. 6, n. 4, p. 53, doi. 10.3390/cryptography6040053
- By:
- Publication type:
- Article
To (US)Be or Not to (US)Be: Discovering Malicious USB Peripherals through Neural Network-Driven Power Analysis.
- Published in:
- Electronics (2079-9292), 2024, v. 13, n. 11, p. 2117, doi. 10.3390/electronics13112117
- By:
- Publication type:
- Article
Demystifying In-Vehicle Intrusion Detection Systems: A Survey of Surveys and a Meta-Taxonomy.
- Published in:
- Electronics (2079-9292), 2022, v. 11, n. 7, p. 1072, doi. 10.3390/electronics11071072
- By:
- Publication type:
- Article
Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 2, p. 347, doi. 10.1007/s10207-022-00630-6
- By:
- Publication type:
- Article
TermID: a distributed swarm intelligence-based approach for wireless intrusion detection.
- Published in:
- International Journal of Information Security, 2017, v. 16, n. 4, p. 401, doi. 10.1007/s10207-016-0335-z
- By:
- Publication type:
- Article
New facets of mobile botnet: architecture and evaluation.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 5, p. 455, doi. 10.1007/s10207-015-0310-0
- By:
- Publication type:
- Article
Editorial: Developments in Security and Privacy-Preserving Mechanisms for Future Mobile Communication Networks.
- Published in:
- 2014
- By:
- Publication type:
- Editorial
Correction: Dissecting contact tracing apps in the Android platform.
- Published in:
- 2021
- By:
- Publication type:
- Correction Notice
Dissecting contact tracing apps in the Android platform.
- Published in:
- PLoS ONE, 2021, v. 16, n. 5, p. 1, doi. 10.1371/journal.pone.0251867
- By:
- Publication type:
- Article
Privacy preserving context transfer schemes for 4G networks.
- Published in:
- Wireless Communications & Mobile Computing, 2011, v. 11, n. 2, p. 289, doi. 10.1002/wcm.1019
- By:
- Publication type:
- Article
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 6, p. 1893, doi. 10.1007/s10207-023-00725-8
- By:
- Publication type:
- Article
MILC: A secure and privacy-preserving mobile instant locator with chatting.
- Published in:
- Information Systems Frontiers, 2012, v. 14, n. 3, p. 481, doi. 10.1007/s10796-010-9254-0
- By:
- Publication type:
- Article
Best of Both Worlds: Detecting Application Layer Attacks through 802.11 and Non-802.11 Features.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 15, p. 5633, doi. 10.3390/s22155633
- By:
- Publication type:
- Article
Let the Cat out of the Bag: Popular Android IoT Apps under Security Scrutiny.
- Published in:
- Sensors (14248220), 2022, v. 22, n. 2, p. 513, doi. 10.3390/s22020513
- By:
- Publication type:
- Article
Efficient Certification Path Discovery for MANET.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2010, p. 1, doi. 10.1155/2010/243985
- By:
- Publication type:
- Article
Performance Evaluation of Public Key-Based Authentication in Future Mobile Communication Systems.
- Published in:
- EURASIP Journal on Wireless Communications & Networking, 2004, v. 2004, n. 1, p. 184
- By:
- Publication type:
- Article
Revisiting the Detection of Lateral Movement through Sysmon.
- Published in:
- Applied Sciences (2076-3417), 2022, v. 12, n. 15, p. 7746, doi. 10.3390/app12157746
- By:
- Publication type:
- Article
A critical review of 13 years of mobile game-based learning.
- Published in:
- Educational Technology Research & Development, 2018, v. 66, n. 2, p. 341, doi. 10.1007/s11423-017-9552-z
- By:
- Publication type:
- Article
Demystifying COVID-19 Digital Contact Tracing: A Survey on Frameworks and Mobile Apps.
- Published in:
- Wireless Communications & Mobile Computing, 2020, p. 1, doi. 10.1155/2020/8851429
- By:
- Publication type:
- Article
Design and implementation of a VoiceXML-driven wiki application for assistive environments on the web.
- Published in:
- Personal & Ubiquitous Computing, 2010, v. 14, n. 6, p. 527, doi. 10.1007/s00779-009-0274-z
- By:
- Publication type:
- Article
Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web-Based Management Interfaces.
- Published in:
- Security & Communication Networks, 2022, p. 1, doi. 10.1155/2022/1833062
- By:
- Publication type:
- Article
The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road Ahead.
- Published in:
- Information (2078-2489), 2024, v. 15, n. 5, p. 268, doi. 10.3390/info15050268
- By:
- Publication type:
- Article
Assessing the Security and Privacy of Android Official ID Wallet Apps.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 8, p. 457, doi. 10.3390/info14080457
- By:
- Publication type:
- Article
A Closer Look at Machine Learning Effectiveness in Android Malware Detection.
- Published in:
- Information (2078-2489), 2023, v. 14, n. 1, p. 2, doi. 10.3390/info14010002
- By:
- Publication type:
- Article
A Comprehensive Survey on Machine Learning Techniques for Android Malware Detection.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 5, p. 185, doi. 10.3390/info12050185
- By:
- Publication type:
- Article
Digital Evidence and Cloud Forensics: Contemporary Legal Challenges and the Power of Disposal.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 5, p. 181, doi. 10.3390/info12050181
- By:
- Publication type:
- Article
BGP Neighbor Trust Establishment Mechanism Based on the Bargaining Game.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 3, p. 110, doi. 10.3390/info12030110
- By:
- Publication type:
- Article
Security Education and Awareness for K-6 Going Mobile.
- Published in:
- International Journal of Interactive Mobile Technologies, 2016, v. 10, n. 2, p. 41, doi. 10.3991/ijim.v10i2.5473
- By:
- Publication type:
- Article
Security, Privacy, and Trust on Internet of Things.
- Published in:
- Wireless Communications & Mobile Computing, 2019, p. 1, doi. 10.1155/2019/6452157
- By:
- Publication type:
- Article
Introducing touchstroke: keystroke-based authentication system for smartphones.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 6, p. 542, doi. 10.1002/sec.1061
- By:
- Publication type:
- Article
SIPA: generic and secure accounting for SIP.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 9, p. 1006, doi. 10.1002/sec.387
- By:
- Publication type:
- Article
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers.
- Published in:
- Security & Communication Networks, 2012, v. 5, n. 1, p. 3, doi. 10.1002/sec.341
- By:
- Publication type:
- Article
ARIBC: Online Reporting Based on Identity-Based Cryptography.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 53, doi. 10.3390/fi13020053
- By:
- Publication type:
- Article
A Multi-Tier Security Analysis of Official Car Management Apps for Android.
- Published in:
- Future Internet, 2021, v. 13, n. 3, p. 58, doi. 10.3390/fi13030058
- By:
- Publication type:
- Article
An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 40, doi. 10.3390/fi13020040
- By:
- Publication type:
- Article
A Systematic Review of Cybersecurity Risks in Higher Education.
- Published in:
- Future Internet, 2021, v. 13, n. 2, p. 39, doi. 10.3390/fi13020039
- By:
- Publication type:
- Article
Neither Denied nor Exposed: Fixing WebRTC Privacy Leaks.
- Published in:
- Future Internet, 2020, v. 12, n. 5, p. 92, doi. 10.3390/fi12050092
- By:
- Publication type:
- Article
Security and Privacy in Wireless and Mobile Networks.
- Published in:
- Future Internet, 2018, v. 10, n. 2, p. 18, doi. 10.3390/fi10020018
- By:
- Publication type:
- Article
Automatic Detection of Online Recruitment Frauds: Characteristics, Methods, and a Public Dataset.
- Published in:
- Future Internet, 2017, v. 9, n. 1, p. 6, doi. 10.3390/fi9010006
- By:
- Publication type:
- Article
Cryptographic Key Management in Delay Tolerant Networks: A Survey.
- Published in:
- Future Internet, 2017, v. 9, n. 3, p. 26, doi. 10.3390/fi9030026
- By:
- Publication type:
- Article