Internet users all over the world are highly exposed to social media exploitation, where they are vulnerable to be targeted by this cyber-attack. Furthermore, excessive use of social media leads to Internet Addiction Disorder (IAD). Fortunately, social media exploitation and IAD can be monitored and controlled closely based on user’s mobile phone surveillance features which are camera, SMS, audio, geolocation (GPS) and call log. Hence to overcome these challenges, this paper presents five (5) Application Programming Interfaces (APIs) and four (4) permissions for SMS and camera that are mostly and widely used with the social media applications. These 9 APIs and permissions matched with 2.7% of the APIs and permissions training dataset that a...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
Information applications are widely used by millions of users to perform manydifferent activities. A...
Internet users all over the world are highly exposed to social media exploitation, where they are vu...
Mobile phones are one of the essential parts of modern life. Making a phone call is not the main pur...
Malware in smartphones is growing at a significant rate. There are currently more than 250 million s...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Smartphones have taken an important role in the current society that many found it impossible to do ...
Abstract: As people are using their smartphones more frequently, cyber criminals are focusing their ...
In the digital world of today mobile phones have a significant impact on our day-to-day lives. In a...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Modern mobile devices are equipped with a variety of tools and services, and handle increasing amoun...
Technological advances in the smartphone industry have revolutionized how we live everyday life. It ...
Abstract. With more than one trillion mobile messages delivered world-wide every year, SMS has been ...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
Information applications are widely used by millions of users to perform manydifferent activities. A...
Internet users all over the world are highly exposed to social media exploitation, where they are vu...
Mobile phones are one of the essential parts of modern life. Making a phone call is not the main pur...
Malware in smartphones is growing at a significant rate. There are currently more than 250 million s...
Abstract: Since the first handheld cellular phone was introduced in 1970s, the mobile phone has chan...
Smartphones have taken an important role in the current society that many found it impossible to do ...
Abstract: As people are using their smartphones more frequently, cyber criminals are focusing their ...
In the digital world of today mobile phones have a significant impact on our day-to-day lives. In a...
The increasing popularity of the Android OS has resulted in its user base surging past 2.5 billion m...
Modern mobile devices are equipped with a variety of tools and services, and handle increasing amoun...
Technological advances in the smartphone industry have revolutionized how we live everyday life. It ...
Abstract. With more than one trillion mobile messages delivered world-wide every year, SMS has been ...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Smart phones are an integral component of the mobile edge computing (MEC) framework. Securing the da...
Abstract—Smartphones are an important asset for people living in the 21st century. With functionalit...
Information applications are widely used by millions of users to perform manydifferent activities. A...