Mobile Information Systems

Advances in Mobile Security Technologies


Publishing date
20 May 2016
Status
Published
Submission deadline
01 Jan 2016

Lead Editor

1Soongsil University, Seoul, Republic of Korea

2Verisign Labs, Virginia, USA

3Georgia Gwinnett College, Georgia, USA

4Chung Hua University, Hsinchu, Taiwan


Advances in Mobile Security Technologies

Description

Mobile devices such as smartphones and Internet tablets have achieved computing and networking capabilities comparable to traditional personal computers. An explosion of mobile devices being used for work has also become a source of pain for adopting users and organizations. For example, the widespread presence of information-stealing applications raises substantial security and privacy concerns. Recently, there has been an explosion of the Internet of things which will make us increasingly rely on intelligent, interconnected devices in every aspect of our lives. Examples include smart systems, smart vehicles, and wearable devices such as smart watches and digital glasses. In such always connected environment, mobile devices still will be an essential gateway from the personal point of view and crosslinking of things offers new possibilities to influence business intelligence and to exchange various data items. This may also lead to a variety of new potential risks concerning both security and privacy, which must be considered. Thus, it is tremendously essential to develop security technologies for mobile system, in particular, dealing with mobile devices.

Hence, the main motivation for this special issue is to bring together researchers, practitioners, policy makers, and hardware and software developers of mobile systems to explore the latest understanding and advances in the security and privacy for mobile devices, applications, and systems. The aim of this special issue is to provide the insight into the discussion of the major research challenges and achievements in various topics of interest.

Potential topics include, but are not limited to:

  • Mobile device/hardware security
  • Mobile OS/middleware security
  • Mobile application security
  • Mobile web security
  • Mobile security for the Internet of things
  • Authenticating users to mobile devices and services
  • Usable security
  • Privacy
  • Rogue application detection and recovery
  • Vulnerability detection and remediation
  • Secure application development

Articles

  • Special Issue
  • - Volume 2016
  • - Article ID 9501918
  • - Editorial

Advances in Mobile Security Technologies

Jeong Hyun Yi | Aziz Mohaisen | ... | Ching-Hsien Hsu
  • Special Issue
  • - Volume 2016
  • - Article ID 2946735
  • - Research Article

The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform

Sanggeun Song | Bongjoon Kim | Sangjun Lee
  • Special Issue
  • - Volume 2016
  • - Article ID 3919134
  • - Research Article

Learning-Based Detection of Harmful Data in Mobile Devices

Seok-Woo Jang | Gye-Young Kim
  • Special Issue
  • - Volume 2016
  • - Article ID 8019830
  • - Research Article

Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays

Mun-Kyu Lee | Jin Bok Kim | Matthew K. Franklin
  • Special Issue
  • - Volume 2016
  • - Article ID 5254141
  • - Research Article

Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation

Shu Yang | Zhihan Liu | ... | Fangchun Yang
  • Special Issue
  • - Volume 2016
  • - Article ID 8973828
  • - Research Article

Security Analysis and Improvement of Fingerprint Authentication for Smartphones

Young-Hoo Jo | Seong-Yun Jeon | ... | Mun-Kyu Lee
  • Special Issue
  • - Volume 2016
  • - Article ID 6707524
  • - Research Article

Function-Oriented Mobile Malware Analysis as First Aid

Jae-wook Jang | Huy Kang Kim
  • Special Issue
  • - Volume 2016
  • - Article ID 3610157
  • - Research Article

A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks

Zhenhua Tan | Xingwei Wang | Xueyi Wang
Mobile Information Systems
 Journal metrics
See full report
Acceptance rate5%
Submission to final decision187 days
Acceptance to publication137 days
CiteScore1.400
Journal Citation Indicator-
Impact Factor-
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.