4 results

Risk assessment for mobile systems through a multilayered hierarchical Bayesian network.

Journal Article
Li, S., Tryfonas, T., Russell, G., & Andriotis, P. (2016)
Risk assessment for mobile systems through a multilayered hierarchical Bayesian network. IEEE Transactions on Cybernetics, 46(8), 1749-1759. https://doi.org/10.1109/TCYB.2016.2537649
Mobile systems are facing a number of application vulnerabilities that can be combined together and utilized to penetrate systems with devastating impact. When assessing the o...

Modelling and Characterization of NAND Flash Memory Channels.

Journal Article
Xu, Q., Gong, P., Chen, T. M., Michael, J., & Li, S. (2015)
Modelling and Characterization of NAND Flash Memory Channels. Measurement : journal of the International Measurement Confederation, 70, 225-231. https://doi.org/10.1016/j.measurement.2015.04.003
The threshold voltage distribution after ideal programming in NAND flash memory cells is usually distorted by a combination of the random telegraph noise (RTN), cell-to-cell I...

Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations

Journal Article
Andriotis, P., Oikonomou, G., Tryfonas, T., & Li, S. (2016)
Highlighting Relationships of a Smartphone’s Social Ecosystem in Potentially Large Investigations. IEEE Transactions on Cybernetics, 46(9), 1974-1985. https://doi.org/10.1109/tcyb.2015.2454733
Social media networks are becoming increasingly popular because they can satisfy diverse needs of individuals (both personal and professional). Modern mobile devices are empow...

Real-time monitoring of privacy abuses and intrusion detection in android system

Conference Proceeding
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015)
Real-time monitoring of privacy abuses and intrusion detection in android system. In Human Aspects of Information Security, Privacy, and Trust. , (379-390). https://doi.org/10.1007/978-3-319-20376-8_34
In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the mali...

Date


Date


Date


Date