A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Privacy in location-based services
2009
unpublished
This dissertation discusses first various aspects of location-based systems and out of it the various needs that have to be addressed to be able to provide flexible location-based services to mobile users ...
The main contribution of this work is a mechanism that is based on the notion of pseudonyms. The use of this kind of pseudonyms provides maximum security and privacy for users during communication. ...
are rather evidence of poor practice. ...
doi:10.25365/thesis.6400
fatcat:b5joaols3nc45m42cyxplmwlra
Preventive Actions to Emerging Threats in Smart Devices Security
2013
The International Journal of Forensic Computer Science
The study revealed that the only type of phone, vulnerable to a virus attack is one that runs an operating system -a Smartphone. ...
Year 2011/12 is an era of embedded systems -Smart Devices and Tablets are enormously common in use. ...
Bluejacking Bluejacking -the distribution of unwanted messages over Bluetooth to Bluetooth-enabled devices such as cell phones, smart devices and PDAs sending a contact number information which typically ...
doi:10.5769/j201301003
fatcat:iegkyjodtjhcpptvvvup4a6nf4
A Simple Way to Improve the Security of Bluetooth Devices
2008
2008 International Symposium on Applications and the Internet
A subsequent investigation of a number of devices determined that no way of configuring individual profiles was available. ...
This fact, combined with the growing sophistication of devices, creates the potential for serious loss in the event of a security breach. ...
BlueJack is
also the name of a tool commonly
used to perform this kind of attack. ...
doi:10.1109/saint.2008.39
dblp:conf/saint/DellG08
fatcat:cozo7uw6nvg7tfr4c7ontrwl7a
MOBILE MALWARE: COMING TO A SMARTPHONE NEAR YOU?
2014
Issues in Information Systems
A total of 187 participants were surveyed, including undergraduates and doctoral students and alumni at a mid-Atlantic university. ...
A set of recommendations for increasing awareness of preventative security measures for mobile malware were also presented. ...
There are a few different types of vulnerabilities that can be exploited when Bluetooth connectivity is turned on for a mobile device. Bluejacking is a type of practical joke akin to spam. ...
doi:10.48009/2_iis_2014_116-123
fatcat:gd3e65pn3vf3rld5vrwzowz4re
PRIVACY AND SECURITY CONSIDERATIONS OF THE IOT: APPROACHING PRIVACY BY DESIGN
2020
Issues in Information Systems
The Internet of Things (IoT) is an ever-expanding network of sensors and devices. ...
In military environments, the consequences of privacy leakage can be enormous. ...
Bluejacking refers to the practice of sending unwanted information to a bluetooth enabled device (e.g., pairing with unsuspecting headphones on an airplane). ...
doi:10.48009/2_iis_2020_57-63
fatcat:6ttf2g346jcndf4yid5sxwgggy
A leaky bucket called smartphone
2012
2012 IEEE International Conference on Pervasive Computing and Communications Workshops
The focus of this work is therefore to present a set of representative attacks on smartphone specific services and to identify meaningful locations where particular countermeasures available from the literature ...
This paper does not intend to present a complete list of attacks. ...
It is very difficult to stop such behavior unless someone actually studies the behavior of the App in a test environment. ...
doi:10.1109/percomw.2012.6197513
dblp:conf/percom/UgusWR12
fatcat:3ed7mzutf5dfrihxzv7bc56pn4
The Mobile Effect
2005
Convergence. The International Journal of Research into New Media Technologies
I shall approach this by drawing upon a consideration of the practice of artists and technologists exploring social and creative applications of mobile technology, as well as upon certain representations ...
distance or location irrelevant. ...
Location-awareness, the technical capacity to locate, has emerged as a key concern across a broad range of contexts, for the routing of calls or the delivery of contextual information -information relevant ...
doi:10.1177/135485650501100204
fatcat:yo2hpxn4yzfojedajjaacoyjde
A User Perspective on the Vulnerabilities of Smart Watches: Is Security a Concern?
2017
Timisoara Journal of Economics and Business
Inspired by a similar study conducted by (Genaro Motti & Caine, 2016), we selected and reviewed 931 comments posted by the buyers of the ten most popular smart watches, in order to identify the hardware ...
Nowadays, we are witnessing a serious gain in popularity of the wearable smart things. ...
The paper offers only a non-exhaustive review of hardware, software and connectivity problems attached to smart watches use, with the intention to raise the awareness in this area of large public interest ...
doi:10.1515/tjeb-2017-0009
fatcat:fhoxl7h4xjd73klwyt476hp2xq
Survey on Vehicular Ad Hoc Networks and Its Access Technologies Security Vulnerabilities and Countermeasures
[article]
2019
arXiv
pre-print
The outcome of this study is of critical importance, because of two main reasons: (1) independent studies on security of VANETs on different strata need to come together and to be covered from a whole ...
In this study, we attempt to add to the literature of Connected and Automated Vehicle (CAV) security by incorporating the security vulnerabilities and countermeasures of the Vehicular Ad hoc Networks ( ...
Bluejacking [126, 127] : Bluejacking is less of a harmful attack resembling fishing in software security. ...
arXiv:1903.01541v1
fatcat:ntanpbw3z5benhlbzn6vzqm7ne
Risk Analysis of BYOD in Afghanistan's Organization
2020
International journal of recent technology and engineering
The main purpose of this study was to analyze BYOD risks in Afghan organizations through cross-sectional quantitative research methods. ...
The implementation of BYOD has brought a clear advantage to the organization. However, the use of BYOD in organizations can pose some risks and threats. ...
ACKNOWLEDGMENT The Authors would like to thank Higher Education Development Program (HEDP) of Afghanistan for supporting this study financially. ...
doi:10.35940/ijrte.c4684.099320
fatcat:esuavy5mvrclvacxis2ovtpos4
Influence of selection systems and shelterwood methods on understory plant communities of longleaf pine forests in flatwoods and uplands
2015
Forest Ecology and Management
Selection silviculture has been practiced on a limited scale in longleaf pine, but difficulty of using traditional approaches and absence of an evaluation across a range of site types has left managers ...
This study was conducted to quantify the effects on understory plant communities of applying single-tree selection, group selection, irregular shelterwood and uniform shelterwood in longleaf pine forests ...
Funding for this study was provided by the State of Florida, Division of Forestry [agreement SRS-04-CO-11330123-043]. ...
doi:10.1016/j.foreco.2015.08.020
fatcat:ouwetkchavcuxfi7pcd6kctnzi
Security and Privacy Risks Awareness for Bring Your Own Device (BYOD) Paradigm
2017
International Journal of Advanced Computer Science and Applications
The growing trend of BYOD in the higher education institutions creates a new form of student learning pedagogy in which students are able to use the mobile devices for their academic purposes in anywhere ...
A survey was conducted in learning the current awareness of security and privacy importance in BYOD for higher education in Malaysia. ...
When users connect their devices to an unsecure network such as public Wi-Fi, the devices will open for a variety of security and privacy attacks such as Wi-Fi hijacking, Bluejacking and etc. ...
doi:10.14569/ijacsa.2017.080208
fatcat:shztel5fxnfnrlez7xrthnmeci
Vertical organization of the division of labor within nests of the Florida harvester ant, Pogonomyrmex badius
2017
PLoS ONE
The importance of these findings for laboratory studies of division of labor are discussed. The efficient allocation of labor is a key component of superorganismal fitness. Fig 5. ...
Distribution of marked seeds, larvae, callow and beetle pieces by depth. A. Distribution of marked seeds in 10 cm increments of depth; B. ...
Acknowledgments We thank Christina Kwapich for advice on mark-recapture procedures and for helpful comments on an earlier version of this paper. ...
doi:10.1371/journal.pone.0188630
pmid:29182686
pmcid:PMC5705139
fatcat:eb7fcrz4efaehi37khssbp3qie
Techniques for Estimating the Size of Low-Density Gopher Tortoise Populations
2017
Journal of Fish and Wildlife Management
These techniques are applicable to other studies and species. ...
Systematic line transect survey designs give better precision and are practical to implement and analyze. ...
Acknowledgments Any use of trade, product, website, or firm names in this publication is for descriptive purposes only and does not imply endorsement by the U.S. Government. ...
doi:10.3996/012017-jfwm-005
fatcat:gjw3dbwlwzc2pkjqi7cpgxv46a
Subtle effects of a managed fire regime: A case study in the longleaf pine ecosystem
2014
Ecological Indicators
Mast was maintained, though in an unnatural distribution, as a result of an elaborate firebreak system. ...
We evaluated the density and distribution of oak (Quercus spp.) and persimmon (Diospyros virgiana) stems and mast after 22 yr of a historical-based growing-season fire prescription that failed to consider ...
Acknowledgments We thank the United States Department of Defense and Fort Bragg Military Installation for financial contributions to this research. We thank the Fort Bragg Wildlife Branch and A. ...
doi:10.1016/j.ecolind.2013.11.006
fatcat:3n4llxgkkfgitnkybbiac5ufci
« Previous
Showing results 1 — 15 out of 103 results