2016
DOI: 10.17781/p002070
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Taxonomy for Mobile Applications Data

Abstract: Abstract-Smartphones are used to perform various types of activities, such as sending emails, transferring money via mobile Internet banking, making calls, texting, web browsing, and playing games. Some of these activities are considered as sensitive and confidential, and are becoming an ever more pressing concern, with high risks associated with scenarios such as loss of sensitive data. Currently, after the point-of-entry authentication at the beginning of a session, using a PIN or password, the user of the d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
5

Relationship

3
2

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 4 publications
0
3
0
Order By: Relevance
“…In summary, each user file from the dataset was produced to generate different files. The first file was produced after applying the risk model [19] and the second after generating possible biometric samples and then computing the identity confidence value. Finally, the two files were compared and matched at a specific time.…”
Section: Inter-process Determinationmentioning
confidence: 99%
“…In summary, each user file from the dataset was produced to generate different files. The first file was produced after applying the risk model [19] and the second after generating possible biometric samples and then computing the identity confidence value. Finally, the two files were compared and matched at a specific time.…”
Section: Inter-process Determinationmentioning
confidence: 99%
“…The paper focuses on SMS spam issue since it has been intruding in our daily life that also has caused severe losses. This threat has become more mature and even sophisticated regarding its form in spam dissemination [7] and its unpleasant impact [9], which can be affected by many aspects such as money loss, discredit of reputation, and even time wasting. These adverse effects are borne by individuals, organizations and also governments [7].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, authentication is vital in securing sensitive data because, after the point-of-entry authentication stage at the beginning of a session that uses a PIN or password, the user of the device can perform almost any task [5]. As a consequence, there is no single level of risk associated with a given application; the risk level should, instead, change during use [6].…”
Section: Introductionmentioning
confidence: 99%