Securing public safety communications on commercial and tactical 5G networks: A survey and future research directions
J Suomalainen, J Julku, M Vehkaperä… - IEEE Open Journal of …, 2021 - ieeexplore.ieee.org
The forthcoming communication networks for public safety authorities rely on the fifth
generation (5G) of mobile networking technologies. Police officers, paramedics, border …
generation (5G) of mobile networking technologies. Police officers, paramedics, border …
Impact of user characteristics on attitudes towards automatic mobile application updates
To keep mobile devices secure, experts recommend turning on auto-updates for
applications, but recent research has suggested that users often avoid auto-updating …
applications, but recent research has suggested that users often avoid auto-updating …
Iotverif: Automatic verification of SSL/TLS certificate for IoT applications
Although extensive research has been conducted on securing the Internet of Things (IoT)
communication protocols, various vulnerabilities and exploits are continuously discovered …
communication protocols, various vulnerabilities and exploits are continuously discovered …
Ease or privacy? a comprehensive analysis of Android embedded adware
With hundreds of millions of Android phone users in around 190 countries, the global
smartphone market has witnessed extraordinary and explosive growth, which is escorted …
smartphone market has witnessed extraordinary and explosive growth, which is escorted …
Developing a course module for teaching cryptography programming on Android
J Xu, X Yuan - 2015 IEEE Frontiers in Education Conference …, 2015 - ieeexplore.ieee.org
Mobile platforms have become extremely popular among users and hence become an
important platform for developers. Mobile devices often store tremendous amount of …
important platform for developers. Mobile devices often store tremendous amount of …
Visual Tracking by Combining the Structure-Aware Network and Spatial-Temporal Regression
In this paper, we propose a novel visual tracking algorithm by combining the structure-aware
network (SA-Net) and spatial-temporal regression model. We first use SA-Net to obtain the …
network (SA-Net) and spatial-temporal regression model. We first use SA-Net to obtain the …
Design and Evaluation of a Course Module on Android Cipher Programming
J Xu, X Yuan, A Velma - Proceedings of the 47th ACM Technical …, 2016 - dl.acm.org
Encryption is critical in protecting the confidentiality of users' data on mobile devices.
However, research has shown that many mobile apps are not correctly using the ciphers …
However, research has shown that many mobile apps are not correctly using the ciphers …