The growth of Internet and the pervasiveness of ICT have led to a radical change in social relationships. One of the drawbacks of this change is the exposure of individuals to threats during online activities. In this context, the techno-regulation paradigm is inspiring new ways to safeguard legally interests by means of tools allowing to hamper breaches of law. In this paper, we focus on the exposure of individuals to specific online threats when interacting with smartphones. We propose a novel techno-regulatory approach exploiting machine learning techniques to provide safeguards against threats online. Specifically, we study a set of touch-based gestures to distinguish between underages or adults who is accessing a smartphone, and so to ...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
This paper studies user classification into children and adults according to their interaction with ...
In this paper, we introduce a novel computer vision based attack that automatically discloses inputs...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
AbstractThe growth of Internet and the pervasiveness of ICT have led to a radical change in social r...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
With the increasing popularity of smartphones and its audience including children as young as 2 year...
Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive ser...
The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. To...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
We introduce a lightweight permission enforcement approach – Tap-Wave-Rub (TWR) – for smartphone ma...
Abstract The security of modern smartphones is related to the combination of Continuous Authenticati...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
This paper studies user classification into children and adults according to their interaction with ...
In this paper, we introduce a novel computer vision based attack that automatically discloses inputs...
The growth of Internet and the pervasiveness of ICT have led to a radical change in social relations...
AbstractThe growth of Internet and the pervasiveness of ICT have led to a radical change in social r...
We propose a new approach for authenticating users of mo-bile devices that is based on analyzing the...
With the increasing popularity of smartphones and its audience including children as young as 2 year...
Abstract—Malware is a burgeoning threat for smartphones. It can surreptitiously access sensitive ser...
The study aims to understand and quantify the privacy threat landscape of touch-based biometrics. To...
AbstractWith the privilege of using mobile devices it is crucial to protect Smartphones by authentic...
Current smartphone security techniques offer less reliability. As an instance, personal identificati...
We introduce a lightweight permission enforcement approach – Tap-Wave-Rub (TWR) – for smartphone ma...
Abstract The security of modern smartphones is related to the combination of Continuous Authenticati...
As smartphones become ever more present and interwoven into the daily computing of individuals, a br...
AbstractIn this work we investigated user authentication on mobile devices using touch behavior and ...
Touchscreens, the dominant input type for mobile devices, require unique authentication solutions. G...
This paper studies user classification into children and adults according to their interaction with ...
In this paper, we introduce a novel computer vision based attack that automatically discloses inputs...