Filters








201,508 Hits in 5.5 sec

Gaps and future directions in mobile security research

Violetta Vylegzhanina, Douglas C. Schmidt, Jules White
2015 Proceedings of the 3rd International Workshop on Mobile Development Lifecycle - MobileDeLi 2015  
This paper analyzes the current state of the mobile security research related to supporting the IoT. We survey existing approaches and identify gaps that motivate future research.  ...  The ease with which security flaws in today's mobile devices can be exploited underscores the need for mobile security research.  ...  We identified research gaps and proposed possible future research directions, especially as IoT deployments become more pervasive.  ... 
doi:10.1145/2846661.2846669 dblp:conf/oopsla/VylegzhaninaSW15 fatcat:qyi53hbfhbee3gatcz7tvg2sja

INTEND Project D 4.3 Transport Research Agend

Merja Hoppe, Thomas Trachsel
2019 Zenodo  
Deliverable 4.3 provides a blueprint of a new and holistic research agenda, consisting of key research and innovation pathways for the future as well as blind spots beyond mainstream research that aim  ...  to support a system transformation and re-organization of the mobility system consistent with political goals of the European Union.  ...  future transport research needs (INTEND).  ... 
doi:10.5281/zenodo.2636478 fatcat:quqhmgpf3fhote6sxakmo75vjq

Cyberterrorism Using Smart Phones

Richard Divine Tseh, Digital Forensics and Cyber Security Graduate Programme Department of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana. richard.tseh@st.gimpa.edu.gh / tsehdivine@gmail.com
2022 Advances in Multidisciplinary & Scientific Research Journal Publication  
The explosive expansion of smart phones causes massive information security breaches. Smart phones are tempting targets and elements for attackers due to their popularity and lax security [6].  ...  This paper seeks to explore cyberterrorism using smart phones and counter measures in Ghana.  ...  DIRECTION FOR FUTURE WORKS The focus of the research was on threat of cyberterrorism in Ghana employing smart phones.  ... 
doi:10.22624/aims/crp-bk3-p7 fatcat:kym4aq5y2rarnlnnpkgct2javu

Spectrum Efficiency and Energy Efficiency in Wireless Communication Networks

Yi Qian
2020 IEEE wireless communications  
The article provides examples of successful DL application in CSI estimation for massive MIMO wireless systems and highlights several promising directions for future research.  ...  Several open research directions to enhance the benefits of DSSN for MTCS are also identified in the article.  ...  His research interests include wireless communications and networks, and information and communication network security.  ... 
doi:10.1109/mwc.2020.9241874 fatcat:durjgqmw5zclnm2trbqp3hgt6u

Editorial: Third Quarter 2020 IEEE Communications Surveys and Tutorials

Ying-Dar Lin
2020 IEEE Communications Surveys and Tutorials  
In the end, the paper also identifies future research directions in using machine and deep learning for security in IoT networks.  ...  future research directions are also discussed.  ... 
doi:10.1109/comst.2020.3013455 fatcat:yd5pyfudirebrlzgxfncrxdwna

Architecture Requirements of the Future Internet

Tapio Frantti, Jyrki Huusko, Reijo Savola, Ville Könönen
2008 Proceedings of the 4th International Mobile Multimedia Communications Conference  
The paper explains the importance of architecture and introduce an architecture gap (problems and bottlenecks) in the current Internet as well as some essential requirements for a new architecture.  ...  In this paper, the purpose is to bring a new clarity to the architectural issues of the Future Internet by abstract reasoning.  ...  On the other hand, a network architecture sets a sense of direction for security, privacy and trust design solutions, which can be seen as main enablers for the Future Internet and the future applications  ... 
doi:10.4108/icst.mobimedia2008.4073 dblp:conf/mobimedia/FranttiHSK08 fatcat:dw7ki6wtl5grhpswttpdx2c43i

SECURITY FOR MOBILE COMMUNICATION AND M-COMMERCE USING SIGNCRYPTION – A DETAILED REVIEW

A. Renuga Devi*1 & Dr.K.Krishnaveni2
2019 Zenodo  
Finally this paper provides the proposed research methodology design to be implemented in future.  ...  Mobile communication and Mobile Commerce is most popular now-a-days because of the service offered during the mobility.  ...  Section 4 deals with the Security Requirements for Signcryption Scheme with the research gap and proposed research methodology design. The conclusion is defined as the next section 5. II.  ... 
doi:10.5281/zenodo.2653599 fatcat:xol2fjlhbfh7xjoy4rmocysjea

Big data, 4IR and electronic banking and banking systems applications in South Africa and Nigeria

Patrick Ajibade, Stephen M. Mutula
2020 Banks and Bank Systems  
Future research trends should examine the impact of the 4IR and big data on the banking system, regional economic integration, and sustainable growth in the continent.  ...  The results also showed a very low research interest in the technical aspect of online banking services such as security (f = 19, TLS = 40), authentication (f = 17, TLS =33), network security (f =13, TLS  ...  The analysis can help researchers to identify gaps for future research.  ... 
doi:10.21511/bbs.15(2).2020.17 fatcat:4kwnsxedd5esrde3pqefcv5kwa

Future Consequences, Perceived Risk and Security and Continuance Intention to Use Mobile Commerce: Proposal Model

Thanh Long Vu, Thi Chuyen Hoang, Thi Nguyet Minh Nguyen
2021 Zenodo  
The effort is put into doing a literature review to clarify the research gap which provides clearer arguments for investigating if and how the perception of risks and security are related to continuance  ...  intention to use mobile commerce under the influence of consideration of future consequences.  ...  Individual differences in the consideration of future and (more) immediate consequences: A review and directions for future research. Social and Personality Psychology Compass, 10(5): 313-326. lxi.  ... 
doi:10.5281/zenodo.4572830 fatcat:ycrldlf4vjfg7kv3455pgmqotq

It's all about me! The Influence of Personality on Susceptibility to Mobile Security Attacks

Rasha Salah El-Din Ibrahim
2015 International Journal of Applied Mathematics Electronics and Computers  
However, further grounded theory analysis returned in personality type taxonomy for exposure for mobile attacks in general and phishing attacks in particular.  ...  The initial thematic analysis identified relationship between level of knowledge and security attitude.  ...  Acknowledgements This research was sponsored by the Arab Republic of Egypt. These studies were conducted by the author under supervision in University of York.  ... 
doi:10.18100/ijamec.47036 fatcat:dy2ol62yqbd3jo5exddv2xay7e

Effect of Personal Innovativeness, Attachment Motivation and Social Norms on the Acceptance of Camera Mobile Phones

Kamel Rouibah, Hasan A. Abbas
2010 International Journal of Handheld Computing Research (IJHCR)  
The implications of this study are highly important for both researchers and practitioners. games, digital camera capabilities, text messaging and mobile commerce (m-commerce).  ...  With the increasing number of mobile phones around the world (4 billion users in 2009, see The Mobile World, 2009), there is no doubt that the mobile services industry is aware of  ...  Next, the authors describe the research methodology. An analysis is presented as well as results pointing out the managerial implications and future research directions.  ... 
doi:10.4018/jhcr.2010100103 fatcat:wvrrxu2svvg5zh5dns5pcrbru4

A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges

Yating Wang, Ing-Ray Chen, Ding-Chau Wang
2014 Wireless personal communications  
For each of the challenges, we provide a survey of existing solutions, identify research gaps, and suggest future research areas.  ...  In this paper we survey existing mobile cloud computing applications, as well as speculate future generation mobile cloud computing applications.  ...  In Section 4 we discuss several major challenges for building the next generation MCC applications, provide a survey of existing solutions, identify research gaps, and suggest future research directions  ... 
doi:10.1007/s11277-014-2102-7 fatcat:3pu4c2tgprayba7j4fgb4z72yi

Development of public financing initiatives in pharmaceutical R&D – is it the key to the future of medicine?

Ildikó Ádám, Zoltán Kaló
2021 Kaleidoscope History  
In this paper, we focus on the public research and development and regulatory incentives to accelerate investment.  ...  Public policymakers had to encourage pharmaceutical companies to invest in research and development in areas with high unmet medical needs.  ...  Europe budget Euratom research and training programme (2021-2025)  Objective Research and training activities to reduce nuclear safety and security risks, development of safe nuclear technologies and  ... 
doi:10.17107/kh.2021.22.316-324 fatcat:g76cy4zfa5byxaqnln7u5hwvey

Big data, 4IR and electronic banking and banking systems applications in South Africa and Nigeria_Ajibade 2020.pdf

Patrick Ajibade, M. Mutula Prof. Stephen
2020 Figshare  
Future research trends should examine the impact of the 4IR and big data on the banking system, regional economic integration, and sustainable growth in the continent.  ...  The results also showed a very low research interest in the technical aspect of online banking services such as security (f = 19, TLS = 40), authentication (f = 17, TLS =33), network security (f =13, TLS  ...  The analysis can help researchers to identify gaps for future research.  ... 
doi:10.6084/m9.figshare.12558653 fatcat:7zbvfwvz4nb6nhk65rxzlyos2y

Multi-Factor Authentication for Online Security of Android Devices

Benjamin Baafi, Law & IT/Digital Forensics and Cyber Security Graduate Programme Department of Information Systems & Innovations Ghana Institute of Management & Public Administration Greenhill, Accra, Ghana E-mail: benjaminbaafi@ymail.com
2022 Advances in Multidisciplinary & Scientific Research Journal Publication  
This paper surveys how multi-factor authentication schemes can be used to secure online-android devices. Keywords: Multi-Factor Authentication, Online Security, Android Devices, Cybercrimes  ...  One of the critical enablers to maintaining this process secure is using Authentication.  ...  RESEARCH GAPS/FINDINGS The paper revealed that Authentication is now very critical more than ever.  ... 
doi:10.22624/aims/crp-bk3-p13 fatcat:aymxuamavbf6phouzolybyjqdm
« Previous Showing results 1 — 15 out of 201,508 results