Advances in technology and wide scale deployment of networking enabled portable devices such as smartphones has made it possible to provide pervasive access to sensitive data to authorized individuals from any location. While this has certainly made data more accessible, it has also increased the risk of data theft as the data may be accessed from potentially unsafe locations in the presence of untrusted parties. The smartphones come with various embedded sensors that can provide rich contextual information such as sensing the presence of other users in a context. Frequent context profiling can also allow a mobile device to learn its surroundings and infer the familiarity and safety of a context. This can be used to further strengthen the a...
This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on sm...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
AbstractSignificant advancement in mobile devices coupled with high speed networks have shifted pers...
The sensors of a context-aware system extract contextual information from the environment and relay ...
Pervasive computing leads to an increased integration between the real world and the computational w...
We present ConXsense, the first framework for context-aware access control on mobile devices based o...
abstract: Smartphones are pervasive nowadays. They are supported by mobile platforms that allow user...
In modern life, the usage of smart devices like smartphones and laptops that allow for access to inf...
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end...
This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on sm...
This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on sm...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Advances in technology and wide scale deployment of networking enabled portable devices such as smar...
In bring-your-own-device (BYOD) and corporate-owned, personally enabled (COPE) scenarios, employees’...
As computing environments become both mobile and pervasive, the need for robust and flexible access ...
In this paper, we present the design and implementation of ConXsense, a framework utilizing context ...
AbstractSignificant advancement in mobile devices coupled with high speed networks have shifted pers...
The sensors of a context-aware system extract contextual information from the environment and relay ...
Pervasive computing leads to an increased integration between the real world and the computational w...
We present ConXsense, the first framework for context-aware access control on mobile devices based o...
abstract: Smartphones are pervasive nowadays. They are supported by mobile platforms that allow user...
In modern life, the usage of smart devices like smartphones and laptops that allow for access to inf...
Mobile smart devices are changing our lives and are the emerging dominant computing platform for end...
This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on sm...
This doctoral dissertation introduces novel security frameworks to detect sensor-based threats on sm...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...
Connectivity and interoperability are becoming more and more critical in today’s software and cyber-...