Wireless and mobile security

2001-09-08
Bicakci, K
Baykal, Nazife
User mobility is becoming an important and popular feature in today's network. This is especially evident in wireless environment. Security is one of the challenging problems introduced by mobile and wireless networking. There are many aspects to the provisioning of security that need to be addressed as part of the development and deployment of future wireless mobile networks. This paper discusses a wide range of issues related to security in wireless and mobile networking and reviews current state-of-the-art approaches. We also discuss in detail the aspects of end-to-end argument related to wireless security protocols.

Suggestions

Random Walk Based Context-Aware Activity Recommendation for Location Based Social Networks
Bagci, Hakan; Karagöz, Pınar (2015-10-21)
The pervasiveness of location-acquisition technologies enable location-based social networks (LBSN) to become increasingly popular in recent years. Users are able to check-in their current location and share information with other users through these networks. LBSN check-in data can be used for the benefit of users by providing personalized recommendations. There are several location recommendation algorithms that employ LBSN data in the literature. However, there are few number of proposed activity recomme...
Demonstratives in the context of a collaborative problem solving task
Büyüktekin, Faruk; Çakır, Murat Perit; Temürcü, Ceyhan; Department of Cognitive Sciences (2018)
Multimodal user interfaces have become increasingly important. They are being used in various applications such as computer games, online education, simulations, and assistive technology. Such interfaces now can make use of inputs coming from different modalities such as speech and eye gaze. This multimodality enables situated dialogue between users and artificial agents, encouraging collaborative language use. Naturally, people need to refer to entities in the surrounding environment using demonstratives d...
Cyber Security by a New Analogy: "The Allegory of the 'Mobile'Cave"
Canbek, Gurol (Informa UK Limited, 2018-01-01)
Mobile devices as the most pervasive technology enablers also bring new security risks in cyberspace. However, related cyber security studies mainly focus on technologies and practices rather than fundamentals and root causes. These studies may also omit the current scientific knowledge gained on other relevant or irrelevant domains that may be adapted to cyber security and ignore human nature that is more important than technology and processes. This study surveys and associates all the analogical methods ...
Trust-aware location recommendation in location-based social networks: A graph-based approach
Canturk, Deniz; Karagöz, Pınar; Kim, Sang-Wook; Toroslu, İsmail Hakkı (2023-03-01)
© 2022 Elsevier LtdWith the increase in the use of mobile devices having location-related capabilities, the use of Location-Based Social Networks (LBSN) has also increased, allowing users to share location-embedded information with other users in the social network. By leveraging check-in activities provided by LBSNs, personalized recommendations can be provided. Trust is an important concept in social networks to improve recommendation quality. In this work, we develop a method for predicting the trust sco...
GUI testing of android applications: a systematic mapping
Aydın, Muzaffer; Betin Can, Aysu; Garousi, Vahid; Department of Information Systems (2014)
Popularity of mobile devices is increasing rapidly all around the world. These devices can be used on various systems which are commonly used by the society. These systems are predicted to overtake desktop platform's popularity in the near future. Therefore the quality of mobile applications has vital importance. High quality applications can only be developed with good testing environments. Considering that multi-featured mobile applications have complex user interfaces, we decided to focus on graphical us...
Citation Formats
K. Bicakci and N. Baykal, “Wireless and mobile security,” 2001, vol. 69, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/53606.