Wireless and mobile security

Bicakci, K
Baykal, Nazife
User mobility is becoming an important and popular feature in today's network. This is especially evident in wireless environment. Security is one of the challenging problems introduced by mobile and wireless networking. There are many aspects to the provisioning of security that need to be addressed as part of the development and deployment of future wireless mobile networks. This paper discusses a wide range of issues related to security in wireless and mobile networking and reviews current state-of-the-art approaches. We also discuss in detail the aspects of end-to-end argument related to wireless security protocols.


Random Walk Based Context-Aware Activity Recommendation for Location Based Social Networks
Bagci, Hakan; Karagöz, Pınar (2015-10-21)
The pervasiveness of location-acquisition technologies enable location-based social networks (LBSN) to become increasingly popular in recent years. Users are able to check-in their current location and share information with other users through these networks. LBSN check-in data can be used for the benefit of users by providing personalized recommendations. There are several location recommendation algorithms that employ LBSN data in the literature. However, there are few number of proposed activity recomme...
Demonstratives in the context of a collaborative problem solving task
Büyüktekin, Faruk; Çakır, Murat Perit; Temürcü, Ceyhan; Department of Cognitive Sciences (2018)
Multimodal user interfaces have become increasingly important. They are being used in various applications such as computer games, online education, simulations, and assistive technology. Such interfaces now can make use of inputs coming from different modalities such as speech and eye gaze. This multimodality enables situated dialogue between users and artificial agents, encouraging collaborative language use. Naturally, people need to refer to entities in the surrounding environment using demonstratives d...
Cyber Security by a New Analogy: "The Allegory of the 'Mobile'Cave"
Canbek, Gurol (Informa UK Limited, 2018-01-01)
Mobile devices as the most pervasive technology enablers also bring new security risks in cyberspace. However, related cyber security studies mainly focus on technologies and practices rather than fundamentals and root causes. These studies may also omit the current scientific knowledge gained on other relevant or irrelevant domains that may be adapted to cyber security and ignore human nature that is more important than technology and processes. This study surveys and associates all the analogical methods ...
GUI testing of android applications: a systematic mapping
Aydın, Muzaffer; Betin Can, Aysu; Garousi, Vahid; Department of Information Systems (2014)
Popularity of mobile devices is increasing rapidly all around the world. These devices can be used on various systems which are commonly used by the society. These systems are predicted to overtake desktop platform's popularity in the near future. Therefore the quality of mobile applications has vital importance. High quality applications can only be developed with good testing environments. Considering that multi-featured mobile applications have complex user interfaces, we decided to focus on graphical us...
Workplace cysberslacking: an investigation based on the theory of planned behavior
Koç, Yasemin Doğa; Toker, Yonca; The Department of Psychology (2020)
The use of computers and mobiles at workspaces has increased dramatically in the last decade. Employees’ access to the Internet is inevitable and mostly required within working hours. Cyberslacking is a phenomenon that describes the non-work-related behavior conducted in the workplace by using the Internet. The effects of Cyberslacking behaviors in the workplace are still controversial. Literature suggests that Cyberslacking can be a facilitator of both positive and negative workplace behaviors. Thus, it is...
Citation Formats
K. Bicakci and N. Baykal, “Wireless and mobile security,” 2001, vol. 69, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/53606.