Academic literature on the topic 'Mobile device security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mobile device security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Mobile device security"
Curran, Kevin, Vivian Maynes, and Declan Harkin. "Mobile device security." International Journal of Information and Computer Security 7, no. 1 (2015): 1. http://dx.doi.org/10.1504/ijics.2015.069205.
Full textA. Harris, Mark, and Karen P. Patten. "Mobile device security considerations for small- and medium-sized enterprise business mobility." Information Management & Computer Security 22, no. 1 (2014): 97–114. http://dx.doi.org/10.1108/imcs-03-2013-0019.
Full textClarke, Nathan, Jane Symes, Hataichanok Saevanee, and Steve Furnell. "Awareness of Mobile Device Security." International Journal of Mobile Computing and Multimedia Communications 7, no. 1 (2016): 15–31. http://dx.doi.org/10.4018/ijmcmc.2016010102.
Full textLakshmiSupraja, K. "Sneaking into Mobile." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (2021): 5107–17. http://dx.doi.org/10.22214/ijraset.2021.36042.
Full textLima, António, Luis Rosa, Tiago Cruz, and Paulo Simões. "A Security Monitoring Framework for Mobile Devices." Electronics 9, no. 8 (2020): 1197. http://dx.doi.org/10.3390/electronics9081197.
Full textAlamer, A., and B. Soh. "FEATHER: A Proposed Lightweight Protocol for Mobile Cloud Computing Security." Engineering, Technology & Applied Science Research 10, no. 4 (2020): 6116–25. http://dx.doi.org/10.48084/etasr.3676.
Full textGiwah, Anthony Duke, Ling Wang, Yair Levy, and Inkyoung Hur. "Empirical assessment of mobile device users’ information security behavior towards data breach." Journal of Intellectual Capital 21, no. 2 (2019): 215–33. http://dx.doi.org/10.1108/jic-03-2019-0063.
Full textViega, John, and Bret Michael. "Guest Editors' Introduction: Mobile Device Security." IEEE Security & Privacy Magazine 8, no. 2 (2010): 11–12. http://dx.doi.org/10.1109/msp.2010.76.
Full textNicholson, A. J., M. D. Corner, and B. D. Noble. "Mobile Device Security Using Transient Authentication." IEEE Transactions on Mobile Computing 5, no. 11 (2006): 1489–502. http://dx.doi.org/10.1109/tmc.2006.169.
Full textChen, Hao, and Wenli Li. "Mobile device users’ privacy security assurance behavior." Information & Computer Security 25, no. 3 (2017): 330–44. http://dx.doi.org/10.1108/ics-04-2016-0027.
Full textDissertations / Theses on the topic "Mobile device security"
Negahban, Arash. "Does Device Matter? Understanding How User, Device, and Usage Characteristics Influence Risky IT Behaviors of Individuals." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804895/.
Full textJalili, Mahmoud. "Analyse Mobile Device Management Criteria." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-38263.
Full textPhillips, Celeste. "Information security governance implementation within the mobile device environment." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/8502.
Full textKarlsson, Anna. "Device Sensor Fingerprinting : Mobile Device Sensor Fingerprinting With A Biometric Approach." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119341.
Full textStirparo, Pasquale. "MobiLeak : A System for Detecting and Preventing Security and Privacy Violations in Mobile Applications." Licentiate thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-134010.
Full textSvensk, Kristoffer. "Mobile Device Security : Exploring the possibilities and limitations with Bring Your Own Device (BYOD)." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-137113.
Full textMoyers, Benjamin. "Multi-Vector Portable Intrusion Detection System." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34265.
Full textAndersson, Gustaf, and Fredrik Andersson. "Android Environment Security." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-20512.
Full textGiwah, Anthony Duke. "Empirical Assessment of Mobile Device Users’ Information Security Behavior towards Data Breach: Leveraging Protection Motivation Theory." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1073.
Full textKainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.
Full textBooks on the topic "Mobile device security"
Fried, Stephen. Mobile device security: A comprehensive guide to securing your information in a moving world. Auerbach Publications, 2010.
Find full textDebbabi, Mourad. Embedded Java security: Security for mobile devices. Springer, 2010.
Find full textRoland, Michael. Security Issues in Mobile NFC Devices. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15488-6.
Full text1980-, Clark Chris, and Thiel David V, eds. Mobile application security: Protect mobile applications and devices from Web 2.0 attacks. McGraw-Hill, 2010.
Find full textArdagna, Claudio A., and Jianying Zhou, eds. Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21040-2.
Full textauthor, Rzeszut Eric J., ed. 10 don'ts on your digital devices: The non-techie's survival guide to cyber security and privacy. Apress, 2014.
Find full textKatie, Strzempka, ed. iPhone and iOS forensics: Investigation, analysis, and mobile security for Apple iPhone, iPad, and iOS devices. Syngress, 2011.
Find full textBook chapters on the topic "Mobile device security"
Téllez, Jesús, and Sherali Zeadally. "Mobile Device Security." In Mobile Payment Systems. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-23033-7_2.
Full textPrasad, Ramjee, and Vandana Rohokale. "Mobile Device Cyber Security." In Springer Series in Wireless Technology. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31703-4_15.
Full textTeufl, Peter, Thomas Zefferer, and Christof Stromberger. "Mobile Device Encryption Systems." In Security and Privacy Protection in Information Processing Systems. Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-39218-4_16.
Full textDekker, Matthew, and Vimal Kumar. "Using Audio Characteristics for Mobile Device Authentication." In Network and System Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-36938-5_6.
Full textQuick, Darren, and Kim-Kwang Raymond Choo. "Data Reduction of Mobile Device Extracts." In SpringerBriefs on Cyber Security Systems and Networks. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-0263-3_4.
Full textXu, Jie, and Lixing Chen. "Security-Aware Incentives Design for Mobile Device-to-Device Offloading." In Proactive and Dynamic Network Defense. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-10597-6_4.
Full textKøien, Geir M. "Privacy Enhanced Device Access." In Security and Privacy in Mobile Information and Communication Systems. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-30244-2_7.
Full textLuo, Jia-Ning, Ming-Hour Yang, and Cho-Luen Tsai. "A Mobile Device-Based Antishoulder-Surfing Identity Authentication Mechanism." In Network and System Security. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46298-1_3.
Full textSong, Chang-Woo, Jeong-Hyun Lim, Kyung-Yong Chung, Ki-Wook Rim, and Jung-Hyun Lee. "Fast Data Acquisition with Mobile Device in Digital Crime." In IT Convergence and Security 2012. Springer Netherlands, 2012. http://dx.doi.org/10.1007/978-94-007-5860-5_84.
Full textChen, Chao-Lieh, Shen-Chien Chen, Chun-Ruei Chang, and Chia-Fei Lin. "Scalable and Autonomous Mobile Device-Centric Cloud for Secured D2D Sharing." In Information Security Applications. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15087-1_14.
Full textConference papers on the topic "Mobile device security"
Halpert, Benjamin. "Mobile device security." In the 1st annual conference. ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059545.
Full textSeacord, Robert C. "Mobile device security." In SPLASH '15: Conference on Systems, Programming, Languages, and Applications: Software for Humanity. ACM, 2015. http://dx.doi.org/10.1145/2846661.2846671.
Full textLuo, Jim, and Myong Kang. "Application Lockbox for Mobile Device Security." In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.66.
Full textdu Toit, Jaco, and Ian Ellefsen. "Location aware mobile device management." In 2015 Information Security for South Africa (ISSA). IEEE, 2015. http://dx.doi.org/10.1109/issa.2015.7335059.
Full textPournaghshband, Vahab, and Peter Reiher. "Protecting Legacy Mobile Medical Devices Using A Wearable Security Device." In 9th International Conference on Advances in Computing and Information Technology. Aircc Publishing Corporation, 2019. http://dx.doi.org/10.5121/csit.2019.91716.
Full textJadhav, Suyash, Tae Oh, Young Ho Kim, and Joeng Nyeo Kim. "Mobile device penetration testing framework and platform for the mobile device security course." In 2015 17th International Conference on Advanced Communication Technology (ICACT). IEEE, 2015. http://dx.doi.org/10.1109/icact.2015.7224881.
Full textHluchy, Ladislav, and Ondrej Habala. "Enhancing mobile device security with process mining." In 2016 IEEE 14th International Symposium on Intelligent Systems and Informatics (SISY). IEEE, 2016. http://dx.doi.org/10.1109/sisy.2016.7601493.
Full textBrodowski, Lukasz, Cameron Dziurgot, and Donald Moretz. "Tapped-based Authentication for Mobile Device Security." In SIGCSE '17: The 48th ACM Technical Symposium on Computer Science Education. ACM, 2017. http://dx.doi.org/10.1145/3017680.3022453.
Full textFurtado, Royston, Atharva More, Jay Bhatt, and Vandana Patil. "SMS-Based Offline Mobile Device Security System." In 2020 International Conference on Computational Intelligence for Smart Power System and Sustainable Energy (CISPSSE). IEEE, 2020. http://dx.doi.org/10.1109/cispsse49931.2020.9212250.
Full textTrewin, Shari, Cal Swart, Larry Koved, Jacquelyn Martino, Kapil Singh, and Shay Ben-David. "Biometric authentication on a mobile device." In the 28th Annual Computer Security Applications Conference. ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420976.
Full textReports on the topic "Mobile device security"
Franklin, Joshua, Kevin Bowler, Christopher Brown, et al. Mobile device security:. National Institute of Standards and Technology, 2019. http://dx.doi.org/10.6028/nist.sp.1800-4.
Full textFranklin, Joshua M., Gema Howell, Kaitlin Boeckl, et al. Mobile Device Security: Corporate-Owned Personally-Enabled (COPE). National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.sp.1800-21.
Full textO'Brien, Gavin. Securing Electronic Health Records on Mobile Devices. National Institute of Standards and Technology, 2017. http://dx.doi.org/10.6028/nist.sp.1800-1.
Full textFranklin, Joshua M., Gema Howell, Scott Ledgerwood, and Jaydee L. Griffith. Security analysis of first responder mobile and wearable devices. National Institute of Standards and Technology, 2020. http://dx.doi.org/10.6028/nist.ir.8196.
Full textSouppaya, Murugiah, and Karen Scarfone. Guidelines for Managing the Security of Mobile Devices in the Enterprise. National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-124r1.
Full text