A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Gaps and future directions in mobile security research
2015
Proceedings of the 3rd International Workshop on Mobile Development Lifecycle - MobileDeLi 2015
This paper analyzes the current state of the mobile security research related to supporting the IoT. We survey existing approaches and identify gaps that motivate future research. ...
The ease with which security flaws in today's mobile devices can be exploited underscores the need for mobile security research. ...
We identified research gaps and proposed possible future research directions, especially as IoT deployments become more pervasive. ...
doi:10.1145/2846661.2846669
dblp:conf/oopsla/VylegzhaninaSW15
fatcat:qyi53hbfhbee3gatcz7tvg2sja
INTEND Project D 4.3 Transport Research Agend
2019
Zenodo
Deliverable 4.3 provides a blueprint of a new and holistic research agenda, consisting of key research and innovation pathways for the future as well as blind spots beyond mainstream research that aim ...
to support a system transformation and re-organization of the mobility system consistent with political goals of the European Union. ...
future transport research needs (INTEND). ...
doi:10.5281/zenodo.2636478
fatcat:quqhmgpf3fhote6sxakmo75vjq
Cyberterrorism Using Smart Phones
2022
Advances in Multidisciplinary & Scientific Research Journal Publication
The explosive expansion of smart phones causes massive information security breaches. Smart phones are tempting targets and elements for attackers due to their popularity and lax security [6]. ...
This paper seeks to explore cyberterrorism using smart phones and counter measures in Ghana. ...
DIRECTION FOR FUTURE WORKS The focus of the research was on threat of cyberterrorism in Ghana employing smart phones. ...
doi:10.22624/aims/crp-bk3-p7
fatcat:kym4aq5y2rarnlnnpkgct2javu
Spectrum Efficiency and Energy Efficiency in Wireless Communication Networks
2020
IEEE wireless communications
The article provides examples of successful DL application in CSI estimation for massive MIMO wireless systems and highlights several promising directions for future research. ...
Several open research directions to enhance the benefits of DSSN for MTCS are also identified in the article. ...
His research interests include wireless communications and networks, and information and communication network security. ...
doi:10.1109/mwc.2020.9241874
fatcat:durjgqmw5zclnm2trbqp3hgt6u
Editorial: Third Quarter 2020 IEEE Communications Surveys and Tutorials
2020
IEEE Communications Surveys and Tutorials
In the end, the paper also identifies future research directions in using machine and deep learning for security in IoT networks. ...
future research directions are also discussed. ...
doi:10.1109/comst.2020.3013455
fatcat:yd5pyfudirebrlzgxfncrxdwna
Architecture Requirements of the Future Internet
2008
Proceedings of the 4th International Mobile Multimedia Communications Conference
The paper explains the importance of architecture and introduce an architecture gap (problems and bottlenecks) in the current Internet as well as some essential requirements for a new architecture. ...
In this paper, the purpose is to bring a new clarity to the architectural issues of the Future Internet by abstract reasoning. ...
On the other hand, a network architecture sets a sense of direction for security, privacy and trust design solutions, which can be seen as main enablers for the Future Internet and the future applications ...
doi:10.4108/icst.mobimedia2008.4073
dblp:conf/mobimedia/FranttiHSK08
fatcat:dw7ki6wtl5grhpswttpdx2c43i
SECURITY FOR MOBILE COMMUNICATION AND M-COMMERCE USING SIGNCRYPTION – A DETAILED REVIEW
2019
Zenodo
Finally this paper provides the proposed research methodology design to be implemented in future. ...
Mobile communication and Mobile Commerce is most popular now-a-days because of the service offered during the mobility. ...
Section 4 deals with the Security Requirements for Signcryption Scheme with the research gap and proposed research methodology design. The conclusion is defined as the next section 5.
II. ...
doi:10.5281/zenodo.2653599
fatcat:xol2fjlhbfh7xjoy4rmocysjea
Big data, 4IR and electronic banking and banking systems applications in South Africa and Nigeria
2020
Banks and Bank Systems
Future research trends should examine the impact of the 4IR and big data on the banking system, regional economic integration, and sustainable growth in the continent. ...
The results also showed a very low research interest in the technical aspect of online banking services such as security (f = 19, TLS = 40), authentication (f = 17, TLS =33), network security (f =13, TLS ...
The analysis can help researchers to identify gaps for future research. ...
doi:10.21511/bbs.15(2).2020.17
fatcat:4kwnsxedd5esrde3pqefcv5kwa
Future Consequences, Perceived Risk and Security and Continuance Intention to Use Mobile Commerce: Proposal Model
2021
Zenodo
The effort is put into doing a literature review to clarify the research gap which provides clearer arguments for investigating if and how the perception of risks and security are related to continuance ...
intention to use mobile commerce under the influence of consideration of future consequences. ...
Individual differences in the consideration of future and (more) immediate consequences: A review and directions for future research. Social and Personality Psychology Compass, 10(5): 313-326. lxi. ...
doi:10.5281/zenodo.4572830
fatcat:ycrldlf4vjfg7kv3455pgmqotq
It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks
2015
International Journal of Applied Mathematics Electronics and Computers
However, further grounded theory analysis returned in personality type taxonomy for exposure for mobile attacks in general and phishing attacks in particular. ...
The initial thematic analysis identified relationship between level of knowledge and security attitude. ...
Acknowledgements This research was sponsored by the Arab Republic of Egypt. These studies were conducted by the author under supervision in University of York. ...
doi:10.18100/ijamec.47036
fatcat:dy2ol62yqbd3jo5exddv2xay7e
Effect of Personal Innovativeness, Attachment Motivation and Social Norms on the Acceptance of Camera Mobile Phones
2010
International Journal of Handheld Computing Research (IJHCR)
The implications of this study are highly important for both researchers and practitioners. games, digital camera capabilities, text messaging and mobile commerce (m-commerce). ...
With the increasing number of mobile phones around the world (4 billion users in 2009, see The Mobile World, 2009), there is no doubt that the mobile services industry is aware of ...
Next, the authors describe the research methodology. An analysis is presented as well as results pointing out the managerial implications and future research directions. ...
doi:10.4018/jhcr.2010100103
fatcat:wvrrxu2svvg5zh5dns5pcrbru4
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges
2014
Wireless personal communications
For each of the challenges, we provide a survey of existing solutions, identify research gaps, and suggest future research areas. ...
In this paper we survey existing mobile cloud computing applications, as well as speculate future generation mobile cloud computing applications. ...
In Section 4 we discuss several major challenges for building the next generation MCC applications, provide a survey of existing solutions, identify research gaps, and suggest future research directions ...
doi:10.1007/s11277-014-2102-7
fatcat:3pu4c2tgprayba7j4fgb4z72yi
Development of public financing initiatives in pharmaceutical R&D – is it the key to the future of medicine?
2021
Kaleidoscope History
In this paper, we focus on the public research and development and regulatory incentives to accelerate investment. ...
Public policymakers had to encourage pharmaceutical companies to invest in research and development in areas with high unmet medical needs. ...
Europe budget Euratom research and training programme (2021-2025) Objective Research and training activities to reduce nuclear safety and security risks, development of safe nuclear technologies and ...
doi:10.17107/kh.2021.22.316-324
fatcat:g76cy4zfa5byxaqnln7u5hwvey
Big data, 4IR and electronic banking and banking systems applications in South Africa and Nigeria_Ajibade 2020.pdf
2020
Figshare
Future research trends should examine the impact of the 4IR and big data on the banking system, regional economic integration, and sustainable growth in the continent. ...
The results also showed a very low research interest in the technical aspect of online banking services such as security (f = 19, TLS = 40), authentication (f = 17, TLS =33), network security (f =13, TLS ...
The analysis can help researchers to identify gaps for future research. ...
doi:10.6084/m9.figshare.12558653
fatcat:7zbvfwvz4nb6nhk65rxzlyos2y
Multi-Factor Authentication for Online Security of Android Devices
2022
Advances in Multidisciplinary & Scientific Research Journal Publication
This paper surveys how multi-factor authentication schemes can be used to secure online-android devices. Keywords: Multi-Factor Authentication, Online Security, Android Devices, Cybercrimes ...
One of the critical enablers to maintaining this process secure is using Authentication. ...
RESEARCH GAPS/FINDINGS The paper revealed that Authentication is now very critical more than ever. ...
doi:10.22624/aims/crp-bk3-p13
fatcat:aymxuamavbf6phouzolybyjqdm
« Previous
Showing results 1 — 15 out of 201,508 results