We rely on various communications and software systems where security is critical. Many of these systems have transformed drastically over time with the addition of new features and technologies to accommodate our increasing needs. Unfortunately, such a transformation can introduce new security threats and weaknesses. This dissertation studies security threats and weaknesses in systems that continue to evolve with legacy and modern software components and paradigms. In this dissertation, we study four different types of information systems: desktop, mobile communications, cloud, and hardware. Our analysis mainly involved building attacks to exploit the vulnerabilities to demonstrate the practicality of our research findings. We uncovered ...
This dissertation includes three approaches we have been designed to tackle threats and challenges i...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Security vulnerabilities are a major concern for software developers. Some vulnerabilities are simpl...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Abstract- The proliferation of smart-phone devices, with ever advancing technological features, has ...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
The thesis examines computer threats and countermeasures on modern world focusing on the use of pers...
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) p...
Research Article published by Scientific Publishing CenterAs the use of web and mobile applications ...
In today’s age of wireless and mobile computing, network and computer security is paramount. Case St...
In the field of computers and with the advent of the internet, the topic of secure communication has...
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near f...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
Threats towards networks are a constant problem, given the rise and rapid growth of the Internet th...
This dissertation includes three approaches we have been designed to tackle threats and challenges i...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
The state of security across the Internet is poor, and it has been so since the advent of the modern...
Security vulnerabilities are a major concern for software developers. Some vulnerabilities are simpl...
Personal computers brought about a revolution in the use of general-purpose computers. They moved in...
Abstract- The proliferation of smart-phone devices, with ever advancing technological features, has ...
PhD thesis in Information technologyInformation and Communication Technologies (ICT) are permeating ...
The thesis examines computer threats and countermeasures on modern world focusing on the use of pers...
Emergent software ecosystems, boomed by the advent of smartphones and the Internet of Things (IoT) p...
Research Article published by Scientific Publishing CenterAs the use of web and mobile applications ...
In today’s age of wireless and mobile computing, network and computer security is paramount. Case St...
In the field of computers and with the advent of the internet, the topic of secure communication has...
Smartphones are widely used nowadays and their popularity will certainly not slow down in the near f...
The use of the Internet has increased drastically the last few years. This trend has led to a consta...
Threats towards networks are a constant problem, given the rise and rapid growth of the Internet th...
This dissertation includes three approaches we have been designed to tackle threats and challenges i...
Mobile phones are no longer static devices that simply make phone calls and send SMS messages. Moder...
The state of security across the Internet is poor, and it has been so since the advent of the modern...