Academic literature on the topic 'Mobile device security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile device security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mobile device security"

1

Curran, Kevin, Vivian Maynes, and Declan Harkin. "Mobile device security." International Journal of Information and Computer Security 7, no. 1 (2015): 1. http://dx.doi.org/10.1504/ijics.2015.069205.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

A. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.

Full text
Abstract:
Purpose – This paper's purpose is to identify and accentuate the dilemma faced by small- to medium-sized enterprises (SMEs) who use mobile devices as part of their mobility business strategy. While large enterprises have the resources to implement emerging security recommendations for mobile devices, such as smartphones and tablets, SMEs often lack the IT resources and capabilities needed. The SME mobile device business dilemma is to invest in more expensive maximum security technologies, invest in less expensive minimum security technologies with increased risk, or postpone the business mobility strategy in order to protect enterprise and customer data and information. This paper investigates mobile device security and the implications of security recommendations for SMEs. Design/methodology/approach – This conceptual paper reviews mobile device security research, identifies increased security risks, and recommends security practices for SMEs. Findings – This paper identifies emerging mobile device security risks and provides a set of minimum mobile device security recommendations practical for SMEs. However, SMEs would still have increased security risks versus large enterprises who can implement maximum mobile device security recommendations. SMEs are faced with a dilemma: embrace the mobility business strategy and adopt and invest in the necessary security technology, implement minimum precautions with increased risk, or give up their mobility business strategy. Practical implications – This paper develops a practical list of minimum mobile device security recommendations for SMEs. It also increases the awareness of potential security risks for SMEs from mobile devices. Originality/value – This paper expands previous research investigating SME adoption of computers, broadband internet-based services, and Wi-Fi by adding mobile devices. It describes the SME competitive advantages from adopting mobile devices for enterprise business mobility, while accentuating the increased business risks and implications for SMEs.
APA, Harvard, Vancouver, ISO, and other styles
3

Clarke, Nathan, Jane Symes, Hataichanok Saevanee, and Steve Furnell. "Awareness of Mobile Device Security." International Journal of Mobile Computing and Multimedia Communications 7, no. 1 (2016): 15–31. http://dx.doi.org/10.4018/ijmcmc.2016010102.

Full text
Abstract:
Mobile devices have become a ubiquitous technology that are also inherently intertwined with modern society. They have enabled a revolution of how people engage and interact with technology, computing and the Internet. However, as their popularity has increased, so have the threats against them. The paper presents the findings of a survey undertaken to examine users' attitudes and opinions towards security for their mobile device. The results are based upon a respondent population of 301 and show a pattern of users being concerned about security for their device (68%), wanting additional security (63%), yet not engaging with the security they are provided with. Only 54% of respondents utilise a PIN for authentication against a backdrop of 46% of respondents experiencing some form of security breach. Interestingly, the results do show a preference for security to be preinstalled and activated out-of-the-box (84%), placing a responsibility on network operators and/or manufacturers to provide sufficient controls.
APA, Harvard, Vancouver, ISO, and other styles
4

LakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.

Full text
Abstract:
As the numbers of android mobiles are increasing day by day and are used to store sensitive information. So, maintaining security is becoming a difficult thing. Here comes the role of penetration testing. The process of performing a penetration test is to verify that mobile devices are vulnerable to security risk or not. We will exploit the mobile devices by preparing and performing the penetration test using Metasploit. It is a framework for developing and executing exploit code against a remote target machine. The main goal is to provide an understanding of mobile device penetration testing using Metasploit Framework and how to utilize it as a security professional.
APA, Harvard, Vancouver, ISO, and other styles
5

Lima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (2020): 1197. http://dx.doi.org/10.3390/electronics9081197.

Full text
Abstract:
Quite often, organizations are confronted with the burden of managing mobile device assets, requiring control over installed applications, security, usage profiles or customization options. From this perspective, the emergence of the Bring Your Own Device (BYOD) trend has aggravated the situation, making it difficult to achieve an adequate balance between corporate regulations, freedom of usage and device heterogeneity. Moreover, device and information protection on mobile ecosystems are quite different from securing other device assets such as laptops or desktops, due to their specific characteristics and limitations—quite often, the resource overhead associated with specific security mechanisms is more important for mobile devices than conventional computing platforms, as the former frequently have comparatively less computing capabilities and more strict power management policies. This paper presents an intrusion and anomaly detection framework specifically designed for managed mobile device ecosystems, that is able to integrate into mobile device and management frameworks for complementing conventional intrusion detection systems. In addition to presenting the reference architecture for the proposed framework, several implementation aspects are also analyzed, based on the lessons learned from developing a proof-of-concept prototype that was used for validation purposes.
APA, Harvard, Vancouver, ISO, and other styles
6

Alamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.

Full text
Abstract:
Ensuring security for lightweight cryptosystems in mobile cloud computing is challenging. Encryption speed and battery consumption must be maintained while securing mobile devices, the server, and the communication channel. This study proposes a lightweight security protocol called FEATHER which implements MICKEY 2.0 to generate keystream in the cloud server and to perform mobile device decryption and encryption. FEATHER can be used to implement secure parameters and lightweight mechanisms for communication among mobile devices and between them and a cloud server. FEATHER is faster than the existing CLOAK protocol and consumes less battery power. FEATHER also allows more mobile devices to communicate at the same time during very short time periods, maintain security for more applications with minimum computation ability. FEATHER meets mobile cloud computing requirements of speed, identity, and confidentiality assurances, compatibility with mobile devices, and effective communication between cloud servers and mobile devices using an unsafe communication channel.
APA, Harvard, Vancouver, ISO, and other styles
7

Giwah, Anthony Duke, Ling Wang, Yair Levy, and Inkyoung Hur. "Empirical assessment of mobile device users’ information security behavior towards data breach." Journal of Intellectual Capital 21, no. 2 (2019): 215–33. http://dx.doi.org/10.1108/jic-03-2019-0063.

Full text
Abstract:
Purpose The purpose of this paper is to investigate the information security behavior of mobile device users in the context of data breach. Much of the previous research done in user information security behavior have been in broad contexts, therefore creating needs of research that focuses on specific emerging technologies and trends such as mobile technology. Design/methodology/approach This study was an empirical study that gathered survey data from 390 mobile users. Delphi study and pilot study were conducted prior to the main survey study. Partial Least Square Structural Equation Modeling was used to analyze the survey data after conducting pre-analysis data screening. Findings This study shows that information security training programs must be designed by practitioners to target the mobile self-efficacy (MSE) of device users. It also reveals that practitioners must design mobile device management systems along with processes and procedures that guides users to take practical steps at protecting their devices. This study shows the high impact of MSE on users’ protection motivation (PM) to protect their mobile devices. Additionally, this study reveals that the PM of users influences their usage of mobile device security. Originality/value This study makes theoretical contributions to the existing information security literature. It confirms PM theory’s power to predict user behavior within the context of mobile device security usage. Additionally, this study investigates mobile users’ actual security usage. Thus, it goes beyond users’ intention.
APA, Harvard, Vancouver, ISO, and other styles
8

Viega, John, and Bret Michael. "Guest Editors' Introduction: Mobile Device Security." IEEE Security & Privacy Magazine 8, no. 2 (2010): 11–12. http://dx.doi.org/10.1109/msp.2010.76.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nicholson, A. J., M. D. Corner, and B. D. Noble. "Mobile Device Security Using Transient Authentication." IEEE Transactions on Mobile Computing 5, no. 11 (2006): 1489–502. http://dx.doi.org/10.1109/tmc.2006.169.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Hao, and Wenli Li. "Mobile device users’ privacy security assurance behavior." Information & Computer Security 25, no. 3 (2017): 330–44. http://dx.doi.org/10.1108/ics-04-2016-0027.

Full text
Abstract:
Purpose Recently, the spread of malicious IT has been causing serious privacy threats to mobile device users, which hampers the efficient use of mobile devices for individual and business. To understand the privacy security assurance behavior of mobile device users, this study aims to develop a theoretical model based on technology threat avoidance theory (TTAT), to capture motivation factors in predicting mobile device user’s voluntary adoption of security defensive software. Design/methodology/approach A survey is conducted to validate the proposed research model. A total of 284 valid survey data are collected and partial least square (PLS)-based structural equation modeling is used to test the model. Findings Results highlight that both privacy concern and coping appraisal have a significant impact on the intention to adopt the security defensive software. Meanwhile, privacy security awareness is a crucial determinant to stimulate mobile device user’s threat and coping appraisal processes in the voluntary context. The results indicate that emotional-based coping appraisal of anticipated regret is also imperative to arouse personal intention to adopt the security tool. Practical implications This result should be of interest to practitioners. Information security awareness training and education programs should be developed in a variety of forms to intensify personal security knowledge and skills. Besides, emotion-based warnings can be designed to arouse users’ protection behavior. Originality/value This paper embeds TTAT theory within the mobile security context. The authors extent TTAT by taking anticipated regret into consideration to capture emotional-based coping appraisal, and information security awareness is employed as the antecedent factor. The extent offers a useful starting point for the further empirical study of emotion elements in the information security context.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Mobile device security"

1

Negahban, Arash. "Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804895/.

Full text
Abstract:
Over the past few years, there has been a skyrocketing growth in the use of mobile devices. Mobile devices are ushering in a new era of multi-platform media and a new paradigm of “being-always-connected”. The proliferation of mobile devices, the dramatic growth of cloud computing services, the availability of high-speed mobile internet, and the increase in the functionalities and network connectivity of mobile devices, have led to creation of a phenomenon called BYOD (Bring Your Own Device), which allows employees to connect their personal devices to corporate networks. BYOD is identified as one of the top ten technology trends in 2014 that can multiply the size of mobile workforce in organizations. However, it can also serve as a vehicle that transfers cyber security threats associated with personal mobile devices to the organizations. As BYOD opens the floodgates of various device types and platforms into organizations, identifying different sources of cyber security threats becomes indispensable. So far, there are no studies that investigated how user, device and usage characteristics affect individuals’ protective and risky IT behaviors. The goal of this dissertation is to expand the current literature in IS security by accounting for the roles of user, device, and usage characteristics in protective and risky IT behaviors of individuals. In this study, we extend the protection motivation theory by conceptualizing and measuring the risky IT behaviors of individuals and investigating how user, device, and usage characteristics along with the traditional protection motivation factors, influence individuals’ protective and risky IT behaviors. We collected data using an online survey. The results of our study show that individuals tend to engage in different levels of protective and risky IT behaviors on different types of devices. We also found that certain individual characteristics as well as the variety of applications that individuals use on their computing devices, influence their protective and risky IT behaviors.
APA, Harvard, Vancouver, ISO, and other styles
2

Jalili, Mahmoud. "Analyse Mobile Device Management Criteria." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-38263.

Full text
Abstract:
Mobility and using smartphones and tablets as replacement of laptops are getting to be increasingly vital for enterprises and accordingly bring new concerns from different perspective for both companies and individuals. To achieve enterprise mobility companies needs to ensure that the mobile equipment are always connected, complies with security policy in a safe and protected path toward being productivity and efficiency. To approach these purposes Mobile Device Management (MDM) was created few years back in order to not only secure enterprises information but additionally manage user’s activities and equipment. However there is no general methodology to define criteria weight for these systems and rather depends on different enterprise policy. One primary issue here is availability of many MDM solutions in market and several difficulties to compare them together and meanwhile most of comparison documents limited based on white papers of providers which mostly designed for commercial market purposes. This thesis will come up with a list of important properties for MDM solutions and evaluate several of solutions as well as categorizing all available criteria in this area. Second part of thesis is a case study of choosing proper MDM solution for two different scenarios and give recommendations on what products to utilize relying upon what sort of association you have. In order to achieve this, strong analytical methods are required to compare existing services and sharper eye from security perspective toward the applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Phillips, Celeste. "Information security governance implementation within the mobile device environment." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8502.

Full text
Abstract:
Includes bibliographical references.<br>Organisational information has been acknowledged to be a valuable asset which must be protected no matter where it is accessed from or how it is accessed. Mobile devices such as smartphones and tablets are becoming a popular means of accessing the organisation's information whether it is on a company-owned or personal mobile device. This has led to an increased awareness of potential risks to the organisation within the mobile device environment which requires organisations to be more vigilant with regards to information security governance. The objective of the research was, therefore, to investigate how organisations go about implementing information security governance within the mobile device environment. The research was conducted at a Retail company where two mobile device implementations took place. The research philosophy was interpretive and the research strategy employed was a grounded case study which allowed theory to be developed using a combination of the grounded theory methodology and the case study method. The use of a mixed approach, deductive and inductive, allowed a conceptual framework to be developed from literature which was used as a sensitising device to start the data collection and analysis process. Qualitative data was collected from multiple sources such as semi-structured interviews and company documents.
APA, Harvard, Vancouver, ISO, and other styles
4

Karlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.

Full text
Abstract:
The number of connected devices connected to the Internet is growing rapidly. When talking about devices it also covers the ones not having any contact with humans. This type of devices are the ones that are expected to increase the most. That is why the field of device fingerprinting is an area that requires further investigation. This thesis measures and evaluates the accelerometer, camera and gyroscope sensor of a mobile device to the use as device fingerprinting. The method used is based on previous research in sensor identification together with methods used for designing a biometric system. The combination with long-proven methods in the biometric area with new research of sensor identification is a new approach of looking at device fingerprinting.
APA, Harvard, Vancouver, ISO, and other styles
5

Stirparo, Pasquale. "MobiLeak : A System for Detecting and Preventing Security and Privacy Violations in Mobile Applications." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Svensk, Kristoffer. "Mobile Device Security : Exploring the possibilities and limitations with Bring Your Own Device (BYOD)." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137113.

Full text
Abstract:
The goal for this thesis is to explore the possibilities with Bring Your OwnDevice (BYOD) on mobile devices using various Mobile Device Management(MDM) features on three different platforms - Android, iOS and Windows Phone8. The work involves a theoretical study and a practical implementation. Theresearch is to investigate the native (built-in) and implementable support forMDM using a client application, while the practical work is to implement aclient application for Android as a proof of concept based on the researchresult. The current threat landscape is revealed as well as suggestions on howto protect mobile devices for BYOD. The result shows that Android is the mostvulnerable platform and lacks native and implementable support for BYOD andMDM functionality using public frameworks. To provide more comprehensivesupport a client application would require more high-risk permissions, that areonly available using firmware signatures or restrictive manufacturer-specificApplication Programming Interface (API).
APA, Harvard, Vancouver, ISO, and other styles
7

Moyers, Benjamin. "Multi-Vector Portable Intrusion Detection System." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34265.

Full text
Abstract:
This research describes an intrusion detection system designed to fulfill the need for increased mobile device security. The Battery-Sensing Intrusion Protection System (B-SIPS) [1] initially took a non-conventional approach to intrusion detection by recognizing attacks based on anomalous Instantaneous Current (IC) drainage. An extension of B-SIPS, the Multi-Vector Portable Intrusion Detection System (MVP-IDS) validates the idea of recognizing attacks based on anomalous IC drain by correlating the detected anomalies with wireless attack traffic from both the Wi-Fi and Bluetooth mediums. To effectively monitor the Wi-Fi and Bluetooth mediums for malicious packet streams, the Snort-Based Wi-Fi and Bluetooth Attack Detection and Signature System (BADSS) modules were introduced. MVP-IDS illustrates that IC anomalies, representing attacks, can be correlated with wireless attack traffic through a collaborative and multi-module approach. Furthermore, MVP-IDS not only correlates wireless attacks, but mitigates them and defends its clients using an administrative response mechanism. This research also provides insight into the ramifications of battery exhaustion Denial of Service (DoS) attacks on battery-powered mobile devices. Several IEEE 802.11 Wi-Fi, IEEE 802.15.1 Bluetooth, and blended attacks are studied to understand their effects on device battery lifetimes. In the worst case, DoS attacks against mobile devices were found to accelerate battery depletion as much as 18.5%. However, if the MVP-IDS version of the B-SIPS client was allowed to run in the background during a BlueSYN flood attack, it could mitigate the attack and preserve as much as 16% of a mobile deviceâ s battery lifetime as compared with an unprotected device.<br>Master of Science
APA, Harvard, Vancouver, ISO, and other styles
8

Andersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.

Full text
Abstract:
In modern times mobile devices are a increasing technology and malicious users are increasing as well. On a mobile device it often exist valuable private information that a malicious user is interested in and it often has lower security features implemented compared to computers. It is therefore important to be aware of the security risks that exist when using a mobile device in order to stay protected.In this thesis information about what security risks and attacks that are possible to execute towards a mobile device running Android will be presented. Possible attack scenarios are attacking the device itself, the communication between the device and a server and finally the server.
APA, Harvard, Vancouver, ISO, and other styles
9

Giwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.

Full text
Abstract:
User information security behavior has been an area of growing demand in information systems (IS) research. Unfortunately, most of the previous research done in user information security behavior have been in broad contexts, therefore creating a gap in the literature of similar research that focuses on specific emerging technologies and trends. With the growing reliance on mobile devices to increase the flexibility, speed and efficiency in how we work, communicate, shop, seek information and entertain ourselves, it is obvious that these devices have become data warehouses and platform for data in transit. This study was an empirical and quantitative study that gathered data leveraging a web-survey. Prior to conducting the survey for the main data collection, a Delphi study and pilot study were conducted. Convenience sampling was the category of nonprobability sampling design used to gather data. The 7-Point Likert Scale was used on all survey items. Pre-analysis data screening was conducted prior to data analysis. The Partial Least Square Structural Equation Modeling (PLS-SEM) was used to analyze the data gathered from a total of 390 responses received. The results of this study showed that perceived threat severity has a negative effect on protection motivation, while perceived threat susceptibility has a positive effect on protection motivation. Contrarily, the results from this study did not show that perceived response cost influences protection motivation. Response efficacy and mobile self-efficacy had a significant positive influence on protection motivation. Mobile device security usage showed to be significantly influenced positively by protection motivation. This study brings additional insight and theoretical implications to the existing literature. The findings reveal the PMT’s capacity to predict user behavior based on threat and coping appraisals within the context of mobile device security usage. Additionally, the extension of the PMT for the research model of this study implies that mobile devices users also can take recommended responses to protect their devices from security threats.
APA, Harvard, Vancouver, ISO, and other styles
10

Kainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Full text
Abstract:
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical channels,and usability studies of HISPs; we follow by presenting the methodology of the research reported in this thesis. We then make a number of contributions discussing the effectiveness of empirical channels and address the design, analysis, and evaluation of these channels. In Chapter 4 we present a user study of pairwise device associations and discuss the factors affecting effective security of empirical channels in single-user scenarios. In Chapter 5 we present a user study of group device associations and discuss the factors affecting effective security of empirical channels in multi-user scenarios. In Chapter 7 we present a framework designed for researchers and system designers to reason about empirical channels in HISPs. The framework is grounded in experimental data, related research, and validated by experts. In Chapter 8 we present a methodology for analysing and evaluating the security and usability of HISPs. We validate the methodology by applying it in laboratory experiments of HISPs. Finally, in Chapter 6 we present a set of principles for designing secure and usable empirical channels. We demonstrate the effectiveness of these principles by proposing new empirical channels.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mobile device security"

1

Mobile device security. Auerbach Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fried, Stephen. Mobile device security. Auerbach Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fried, Stephen. Mobile device security: A comprehensive guide to securing your information in a moving world. Auerbach Publications, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Debbabi, Mourad. Embedded Java security: Security for mobile devices. Springer, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Roland, Michael. Security Issues in Mobile NFC Devices. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15488-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ardagna, Claudio A., and Jianying Zhou, eds. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21040-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

author, Rzeszut Eric J., ed. 10 don'ts on your digital devices: The non-techie's survival guide to cyber security and privacy. Apress, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

iPhone forensics. O'Reilly, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Katie, Strzempka, ed. iPhone and iOS forensics: Investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices. Syngress, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Mobile device security"

1

Téllez, Jesús, and Sherali Zeadally. "Mobile Device Security." In Mobile Payment Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-23033-7_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Prasad, Ramjee, and Vandana Rohokale. "Mobile Device Cyber Security." In Springer Series in Wireless Technology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31703-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teufl, Peter, Thomas Zefferer, and Christof Stromberger. "Mobile Device Encryption Systems." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dekker, Matthew, and Vimal Kumar. "Using Audio Characteristics for Mobile Device Authentication." In Network and System Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quick, Darren, and Kim-Kwang Raymond Choo. "Data Reduction of Mobile Device Extracts." In SpringerBriefs on Cyber Security Systems and Networks. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0263-3_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Jie, and Lixing Chen. "Security-Aware Incentives Design for Mobile Device-to-Device Offloading." In Proactive and Dynamic Network Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10597-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Køien, Geir M. "Privacy Enhanced Device Access." In Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Luo, Jia-Ning, Ming-Hour Yang, and Cho-Luen Tsai. "A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism." In Network and System Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Song, Chang-Woo, Jeong-Hyun Lim, Kyung-Yong Chung, Ki-Wook Rim, and Jung-Hyun Lee. "Fast Data Acquisition with Mobile Device in Digital Crime." In IT Convergence and Security 2012. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Chao-Lieh, Shen-Chien Chen, Chun-Ruei Chang, and Chia-Fei Lin. "Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mobile device security"

1

Halpert, Benjamin. "Mobile device security." In the 1st annual conference. ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059545.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seacord, Robert C. "Mobile device security." In SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity. ACM, 2015. http://dx.doi.org/10.1145/2846661.2846671.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Jim, and Myong Kang. "Application Lockbox for Mobile Device Security." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

du Toit, Jaco, and Ian Ellefsen. "Location aware mobile device management." In 2015 Information Security for South Africa (ISSA). IEEE, 2015. http://dx.doi.org/10.1109/issa.2015.7335059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Pournaghshband, Vahab, and Peter Reiher. "Protecting Legacy Mobile Medical Devices Using A Wearable Security Device." In 9th International Conference on Advances in Computing and Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jadhav, Suyash, Tae Oh, Young Ho Kim, and Joeng Nyeo Kim. "Mobile device penetration testing framework and platform for the mobile device security course." In 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015. http://dx.doi.org/10.1109/icact.2015.7224881.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hluchy, Ladislav, and Ondrej Habala. "Enhancing mobile device security with process mining." In 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE, 2016. http://dx.doi.org/10.1109/sisy.2016.7601493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Brodowski, Lukasz, Cameron Dziurgot, and Donald Moretz. "Tapped-based Authentication for Mobile Device Security." In SIGCSE '17: The 48th ACM Technical Symposium on Computer Science Education. ACM, 2017. http://dx.doi.org/10.1145/3017680.3022453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Furtado, Royston, Atharva More, Jay Bhatt, and Vandana Patil. "SMS-Based Offline Mobile Device Security System." In 2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE). IEEE, 2020. http://dx.doi.org/10.1109/cispsse49931.2020.9212250.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Trewin, Shari, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, and Shay Ben-David. "Biometric authentication on a mobile device." In the 28th Annual Computer Security Applications Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420976.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Mobile device security"

1

Franklin, Joshua, Kevin Bowler, Christopher Brown, et al. Mobile device security:. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.sp.1800-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Franklin, Joshua M., Gema Howell, Kaitlin Boeckl, et al. Mobile Device Security: Corporate-Owned Personally-Enabled (COPE). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.1800-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

O'Brien, Gavin. Securing Electronic Health Records on Mobile Devices. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.1800-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Franklin, Joshua M., Gema Howell, Scott Ledgerwood, and Jaydee L. Griffith. Security analysis of first responder mobile and wearable devices. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8196.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Souppaya, Murugiah, and Karen Scarfone. Guidelines for Managing the Security of Mobile Devices in the Enterprise. National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-124r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography