{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,7]],"date-time":"2025-06-07T22:22:15Z","timestamp":1749334935051,"version":"3.40.3"},"publisher-location":"Cham","reference-count":120,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_23","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T07:02:28Z","timestamp":1577775748000},"page":"585-608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Systematic Review on Security and Privacy Issues in Mobile Devices and Systems"],"prefix":"10.1007","author":[{"given":"Mohamed","family":"Alloghani","sequence":"first","affiliation":[]},{"given":"Thar","family":"Baker","sequence":"additional","affiliation":[]},{"given":"Dhiya","family":"Al-Jumeily","sequence":"additional","affiliation":[]},{"given":"Abir","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Jamila","family":"Mustafina","sequence":"additional","affiliation":[]},{"given":"Ahmed J.","family":"Aljaaf","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/B978-0-12-804629-6.00001-8","volume-title":"Mobile security and privacy: Advances, challenges and future research directions","author":"MH Au","year":"2017","unstructured":"Au, M. H., & Choo, K.-K. R. (2017). Chapter 1 \u2013 Mobile security and privacy. In M. H. Au & K.-K. R. Choo (Eds.), Mobile security and privacy: Advances, challenges and future research directions (pp. 1\u20134). Boston: Syngress. \nhttps:\/\/doi.org\/10.1016\/B978-0-12-804629- 6.00001-8\n\n."},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/B978-0-12-802864-3.00003-9","volume-title":"Mobile data loss","author":"MT Raggo","year":"2016","unstructured":"Raggo, M. T., & Raggo, M. T. (2016). Chapter 3 \u2013 Mobile security countermeasures. In Mobile data loss (pp. 17\u201328). Boston: Syngress. \nhttps:\/\/doi.org\/10.1016\/B978-0- 12-802864-3.00003-9\n\n."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/B978-0-12-804629-6.00002-X","volume-title":"Mobile security and privacy","author":"S Tully","year":"2017","unstructured":"Tully, S., & Mohanraj, Y. (2017). Chapter 2 \u2013 Mobile security: A practitioner\u2019s perspective. In Mobile security and privacy (pp. 5\u201355). Boston: Syngress. \nhttps:\/\/doi.org\/10.1016\/B978- 0-12-804629-6.00002-X\n\n."},{"key":"23_CR4","volume-title":"Security, privacy, trust, and resource management in mobile and wireless communications","author":"DB Rawat","year":"2013","unstructured":"Rawat, D. B. (2013). Security, privacy, trust, and resource management in mobile and wireless communications. Hershey: IGI Global."},{"issue":"6","key":"23_CR5","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1109\/MCOM.2015.7120022","volume":"53","author":"K Huang","year":"2015","unstructured":"Huang, K., & Zhou, X. (2015). Cutting the last wires for mobile communications by microwave power transfer. IEEE Communications Magazine, 53(6), 86\u201393.","journal-title":"IEEE Communications Magazine"},{"key":"23_CR6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-0105-3","volume-title":"Handbook of research on modern cryptographic solutions for computer and cyber security","author":"BB Gupta","year":"2016","unstructured":"Gupta, B. B., Agrawal, D., & Yamaguchi, S. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security. Hershey: IGI Publishing. \nhttps:\/\/doi.org\/10.4018\/978-1-5225-0105-3\n\n."},{"key":"23_CR7","volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","author":"BB Gupta","year":"2018","unstructured":"Gupta, B. B., & Wang, H. (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. Boca Raton: Auerbach Publishers. Retrieved from \nhttps:\/\/books.google.co.ke\/books?id=rXBRuQEACAAJ\n\n."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1016\/j.future.2017.11.026","volume":"80","author":"RN Akram","year":"2018","unstructured":"Akram, R. N., Chen, H. H., Lopez, J., Sauveron, D., & Yang, L. T. (2018). Security, privacy and trust of user-centric solutions. Future Generation Computer Systems, 80, 417\u2013420. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.11.026\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L. A., & Coen-Porisini, A. (2015). Security, privacy and trust in Internet of Things: The road ahead. Computer Networks, 76, 146\u2013164. \nhttps:\/\/doi.org\/10.1016\/j.comnet.2014.11.008\n\n.","journal-title":"Computer Networks"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"326","DOI":"10.1016\/j.future.2018.01.059","volume":"83","author":"K Sha","year":"2018","unstructured":"Sha, K., Wei, W., Andrew Yang, T., Wang, Z., & Shi, W. (2018). On security challenges and open issues in Internet of Things. Future Generation Computer Systems, 83, 326\u2013337. \nhttps:\/\/doi.org\/10.1016\/j.future.2018.01.059\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1179\/2047480615Z.000000000329","volume":"24","author":"R Ferrari","year":"2015","unstructured":"Ferrari, R. (2015). Writing narrative style literature reviews. Medical Writing, 24, 230\u2013235. \nhttps:\/\/doi.org\/10.1179\/2047480615Z.000000000329\n\n.","journal-title":"Medical Writing"},{"issue":"12","key":"23_CR12","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TIP.2002.806251","volume":"11","author":"Y Nie","year":"2002","unstructured":"Nie, Y., & Ma, K.-K. (2002). Adaptive rood pattern search for fast block-matching motion estimation. IEEE Transactions on Image Processing, 11(12), 1442\u20131449.","journal-title":"IEEE Transactions on Image Processing"},{"key":"23_CR13","unstructured":"Moher, D., Liberati, A., & Tetzlaff, J. (2009). PRISMA 2009 flow diagram. The PRISMA Statement. \nhttps:\/\/doi.org\/10.1371\/journal.pmed1000097\n\n."},{"issue":"7","key":"23_CR14","doi-asserted-by":"publisher","first-page":"e1000097","DOI":"10.1371\/journal.pmed.1000097","volume":"6","author":"D Moher","year":"2009","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D. G., Altman, D., Antes, G., et al. (2009). Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. PLoS Medicine, 6(7), e1000097. \nhttps:\/\/doi.org\/10.1371\/journal.pmed.1000097\n\n.","journal-title":"PLoS Medicine"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"1051","DOI":"10.1145\/1134285.1134500","volume":"2","author":"B Kitchenham","year":"2007","unstructured":"Kitchenham, B., & Charters, S. (2007). Guidelines for performing systematic literature reviews in software engineering. Engineering, 2, 1051. \nhttps:\/\/doi.org\/10.1145\/1134285.1134500\n\n.","journal-title":"Engineering"},{"issue":"1","key":"23_CR16","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.infsof.2008.09.009","volume":"51","author":"B Kitchenham","year":"2009","unstructured":"Kitchenham, B., Pearl Brereton, O., Budgen, D., Turner, M., Bailey, J., & Linkman, S. (2009). Systematic literature reviews in software engineering \u2013 A systematic literature review. Information and Software Technology, 51(1), 7\u201315. \nhttps:\/\/doi.org\/10.1016\/j.infsof.2008.09.009\n\n.","journal-title":"Information and Software Technology"},{"issue":"4","key":"23_CR17","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jss.2006.07.009","volume":"80","author":"Pearl Brereton","year":"2007","unstructured":"Brereton, P., Kitchenham, B. A., Budgen, D., Turner, M., & Khalil, M. (2007). Lessons from applying the systematic literature review process within the software engineering domain. Journal of Systems and Software. \nhttps:\/\/doi.org\/10.1016\/j.jss.2006.07.009\n\n.","journal-title":"Journal of Systems and Software"},{"key":"23_CR18","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134500","volume-title":"Proceeding of the 28th International Conference on Software Engineering \u2013 ICSE\u201906","author":"D Budgen","year":"2006","unstructured":"Budgen, D., & Brereton, P. (2006). Performing systematic literature reviews in software engineering. In Proceeding of the 28th International Conference on Software Engineering \u2013 ICSE\u201906. \nhttps:\/\/doi.org\/10.1145\/1134285.1134500\n\n."},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.infsof.2016.01.010","volume":"75","author":"Ayca Tarhan","year":"2016","unstructured":"Tarhan, A., Turetken, O., & Reijers, H. A. (2016). Business process maturity models: A systematic literature review. Information and Software Technology. \nhttps:\/\/doi.org\/10.1016\/j.infsof.2016.01.010\n\n.","journal-title":"Information and Software Technology"},{"key":"23_CR20","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/978-3-540-70621-2","volume":"679","author":"J Biolchini","year":"2005","unstructured":"Biolchini, J., Mian, P. G., Candida, A., & Natali, C. (2005). Systematic review in software engineering. Engineering, 679, 45. \nhttps:\/\/doi.org\/10.1007\/978-3-540-70621-2\n\n.","journal-title":"Engineering"},{"key":"23_CR21","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1016\/j.ijpe.2016.09.006","volume":"182","author":"Roberto Cerchione","year":"2016","unstructured":"Cerchione, R., & Esposito, E. (2016). A systematic review of supply chain knowledge management research: State of the art and research opportunities. International Journal of Production Economics. \nhttps:\/\/doi.org\/10.1016\/j.ijpe.2016.09.006\n\n.","journal-title":"International Journal of Production Economics"},{"issue":"2","key":"23_CR22","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1080\/02667363.2014.900913","volume":"30","author":"Frank Pearson","year":"2014","unstructured":"Pearson, F. (2014). Systematic approaches to a successful literature review. Educational Psychology in Practice. \nhttps:\/\/doi.org\/10.1080\/02667363.2014.900913\n\n.","journal-title":"Educational Psychology in Practice"},{"issue":"4","key":"23_CR23","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1037\/a0029188","volume":"32","author":"Alison Selby","year":"2013","unstructured":"Selby, A., & Smith-Osborne, A. (2013). A systematic review of effectiveness of complementary and adjunct therapies and interventions involving equines. Health Psychology. \nhttps:\/\/doi.org\/10.1037\/a0029188\n\n.","journal-title":"Health Psychology"},{"key":"23_CR24","first-page":"132","volume":"17","author":"BC Wallace","year":"2016","unstructured":"Wallace, B. C., Kuiper, J., Sharma, A., Zhu, M., Marshall, I. J., & Kuiper, J. (2016). Extracting PICO sentences from clinical trial reports using supervised distant supervision. Journal of Machine Learning Research, 17, 132.","journal-title":"Journal of Machine Learning Research"},{"issue":"1","key":"23_CR25","doi-asserted-by":"publisher","first-page":"47","DOI":"10.4103\/0253-7184.69003","volume":"31","author":"S Aslam","year":"2010","unstructured":"Aslam, S., & Emmanuel, P. (2010). Formulating a researchable question: A critical step for facilitating good clinical research. Indian Journal of Sexually Transmitted Diseases and AIDS, 31(1), 47\u201350. \nhttps:\/\/doi.org\/10.4103\/0253-7184.69003\n\n.","journal-title":"Indian Journal of Sexually Transmitted Diseases and AIDS"},{"issue":"10","key":"23_CR26","doi-asserted-by":"publisher","first-page":"1435","DOI":"10.1177\/1049732312452938","volume":"22","author":"Alison Cooke","year":"2012","unstructured":"Cooke, A., Smith, D., & Booth, A. (2012). Beyond PICO: The SPIDER tool for qualitative evidence synthesis. Qualitative Health Research. \nhttps:\/\/doi.org\/10.1177\/1049732312452938\n\n.","journal-title":"Qualitative Health Research"},{"key":"23_CR27","doi-asserted-by":"publisher","DOI":"10.3233\/978-1-61499-289-9-1057","volume-title":"Studies in health technology and informatics","author":"D O\u2019Sullivan","year":"2013","unstructured":"O\u2019Sullivan, D., Wilk, S., Michalowski, W., & Farion, K. (2013). Using PICO to align medical evidence with MDs decision making models. In Studies in health technology and informatics. \nhttps:\/\/doi.org\/10.3233\/978-1-61499-289-9-1057\n\n."},{"issue":"3","key":"23_CR28","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1590\/S0104-11692007000300023","volume":"15","author":"Cristina Mam\u00e9dio da Costa Santos","year":"2007","unstructured":"Santos, C. M. d. C., Pimenta, C. A. d. M., & Nobre, M. R. C. (2007). The PICO strategy for the research question construction and evidence search. Revista Latino-Americana de Enfermagem. \nhttps:\/\/doi.org\/10.1590\/S0104-11692007000300023\n\n.","journal-title":"Revista Latino-Americana de Enfermagem"},{"key":"23_CR29","volume-title":"VII. Systematic search: how to look for medical documents","author":"R Rivas-Ruiz","year":"2012","unstructured":"Rivas-Ruiz, R., & Talavera, J. O. (2012). VII. Systematic search: how to look for medical documents. Ciudad de M\u00e9xico: Revista M\u00e9dica Del Instituto Mexicano Del Seguro Social."},{"issue":"3","key":"23_CR30","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s13191-011-0041-5","volume":"10","author":"Shilpa Shetty","year":"2010","unstructured":"Shetty, S., Pitti, V., Babu, C. L. S., Kumar, G. P. S., & Deepthi, B. C. (2010). Bruxism: A literature review. Journal of Indian Prosthodontist Society. \nhttps:\/\/doi.org\/10.1007\/s13191-011-0041-5\n\n.","journal-title":"The Journal of Indian Prosthodontic Society"},{"issue":"11","key":"23_CR31","doi-asserted-by":"publisher","first-page":"41","DOI":"10.7748\/ns.20.11.41.s53","volume":"20","author":"Fiona Timmins","year":"2005","unstructured":"Timmins, F., & McCabe, C. (2005). How to conduct an effective literature search. Nursing Standard. \nhttps:\/\/doi.org\/10.7748\/ns2005.11.20.11.41.c4010\n\n.","journal-title":"Nursing Standard"},{"key":"23_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14908-0_2","volume-title":"Leadership and organizational outcomes: Meta-analysis of empirical studies","author":"N \u00c7o\u011faltay","year":"2015","unstructured":"\u00c7o\u011faltay, N., & Karada\u011f, E. (2015). Introduction to meta-analysis. In Leadership and organizational outcomes: Meta-analysis of empirical studies. \nhttps:\/\/doi.org\/10.1007\/978- 3-319-14908-0_2\n\n."},{"issue":"6","key":"23_CR33","doi-asserted-by":"publisher","first-page":"763","DOI":"10.1016\/j.cpr.2013.05.005","volume":"33","author":"Bassam Khoury","year":"2013","unstructured":"Khoury, B., Lecomte, T., Fortin, G., Masse, M., Therien, P., Bouchard, V., et al. (2013). Mindfulness-based therapy: A comprehensive meta-analysis. Clinical Psychology Review. \nhttps:\/\/doi.org\/10.1016\/j.cpr.2013.05.005\n\n.","journal-title":"Clinical Psychology Review"},{"issue":"2","key":"23_CR34","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1093\/beheco\/arm144","volume":"19","author":"Brian R. Smith","year":"2008","unstructured":"Smith, B. R., & Blumstein, D. T. (2008). Fitness consequences of personality: A meta-analysis. Behavioral Ecology. \nhttps:\/\/doi.org\/10.1093\/beheco\/arm144\n\n.","journal-title":"Behavioral Ecology"},{"key":"23_CR35","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"Ibrahim Abaker Targio Hashem","year":"2015","unstructured":"Hashem, I. A. T., Yaqoob, I., Anuar, N. B., Mokhtar, S., Gani, A., & Ullah Khan, S. (2015). The rise of \u201cbig data\u201d on cloud computing: Review and open research issues. Information Systems. \nhttps:\/\/doi.org\/10.1016\/j.is.2014.07.006\n\n.","journal-title":"Information Systems"},{"key":"23_CR36","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1016\/j.is.2014.07.006","volume":"47","author":"Ibrahim Abaker Targio Hashem","year":"2015","unstructured":"Hashem, I. A. T., Yaqoob, I., Badrul Anuar, N., Mokhtar, S., Gani, A., & Ullah Khan, S. (2014). The rise of \u201cBig Data\u201d on cloud computing: Review and open research issues. Information Systems. \nhttps:\/\/doi.org\/10.1016\/j.is.2014.07.006\n\n.","journal-title":"Information Systems"},{"key":"23_CR37","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/j.jisa.2017.11.002","volume":"38","author":"M Ammar","year":"2018","unstructured":"Ammar, M., Russello, G., & Crispo, B. (2018). Internet of Things: A survey on the security of IoT frameworks. Journal of Information Security and Applications, 38, 8\u201327. \nhttps:\/\/doi.org\/10.1016\/j.jisa.2017.11.002\n\n.","journal-title":"Journal of Information Security and Applications"},{"key":"23_CR38","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/j.procs.2017.12.089","volume":"125","author":"PR Kumar","year":"2018","unstructured":"Kumar, P. R., Raj, P. H., & Jelciana, P. (2018). Exploring data security issues and solutions in cloud computing. Procedia Computer Science, 125, 691\u2013697. \nhttps:\/\/doi.org\/10.1016\/j.procs.2017.12.089\n\n.","journal-title":"Procedia Computer Science"},{"key":"23_CR39","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/J.FUTURE.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B.-G., & Gupta, B. (2018). Secure integration of IoT and Cloud Computing. Future Generation Computer Systems, 78, 964\u2013975. \nhttps:\/\/doi.org\/10.1016\/J.FUTURE.2016.11.031\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"23_CR40","doi-asserted-by":"publisher","first-page":"5672154:1","DOI":"10.1155\/2018\/5672154","volume":"2018","author":"H Khelifi","year":"2018","unstructured":"Khelifi, H., Luo, S., Nour, B., & Shah, S. C. (2018). Security and privacy issues in vehicular named data networks: An overview. Mobile Information Systems, 2018, 5672154:1\u20135672154:11. \nhttps:\/\/doi.org\/10.1155\/2018\/5672154\n\n.","journal-title":"Mobile Information Systems"},{"key":"23_CR41","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2018\/7905960","volume":"2018","author":"Ashish Rauniyar","year":"2018","unstructured":"Rauniyar, A., Hagos, D. H., & Shrestha, M. (2018, 2018). A crowd-based intelligence approach for measurable security, privacy, and dependability in internet of automated vehicles with vehicular fog. Mobile Information Systems, 7905960. \nhttps:\/\/doi.org\/10.1155\/2018\/7905960\n\n.","journal-title":"Mobile Information Systems"},{"key":"23_CR42","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/549420","volume":"2015","author":"Mojca Volk","year":"2015","unstructured":"Volk, M., Sterle, J., & Sedlar, U. (2015). Safety and privacy considerations for mobile application design in digital healthcare. International Journal of Distributed Sensor Networks. \nhttps:\/\/doi.org\/10.1155\/2015\/549420\n\n.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"23_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2017","unstructured":"Adat, V., & Gupta, B. B. (2017). Security in Internet of Things: Issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67, 1\u201319. \nhttps:\/\/doi.org\/10.1007\/s11235-017-0345-9\n\n.","journal-title":"Telecommunication Systems"},{"issue":"2","key":"23_CR44","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s41635-017-0029-7","volume":"2","author":"K Chen","year":"2018","unstructured":"Chen, K., Zhang, S., Li, Z., Zhang, Y., Deng, Q., Ray, S., & Jin, Y. (2018). Internet-of-Things security and vulnerabilities: Taxonomy, challenges, and practice. Journal of Hardware and Systems Security, 2(2), 97\u2013110. \nhttps:\/\/doi.org\/10.1007\/s41635-017-0029-7\n\n.","journal-title":"Journal of Hardware and Systems Security"},{"key":"23_CR45","doi-asserted-by":"publisher","first-page":"151","DOI":"10.4028\/www.scientific.net\/AMM.519-520.151","volume":"519\u2013520","author":"XM Chen","year":"2014","unstructured":"Chen, X. M., & Zou, S. H. (2014). A secure mobile payments protocol based on ECC. Applied Mechanics and Materials, 519\u2013520, 151\u2013154. \nhttps:\/\/doi.org\/10.4028\/www.scientific.net\/AMM.519-520.151\n\n.","journal-title":"Applied Mechanics and Materials"},{"issue":"1","key":"23_CR46","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1108\/ICS-04-2015-0018","volume":"24","author":"A Das","year":"2016","unstructured":"Das, A., & Khan, H. U. (2016). Security behaviors of smartphone users. Information and Computer Security, 24(1), 116\u2013134. \nhttps:\/\/doi.org\/10.1108\/ICS-04-2015-0018\n\n.","journal-title":"Information and Computer Security"},{"issue":"4","key":"23_CR47","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.jare.2014.02.006","volume":"5","author":"Adel S. Elmaghraby","year":"2014","unstructured":"Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in smart cities: Safety, security and privacy. Journal of Advanced Research. \nhttps:\/\/doi.org\/10.1016\/j.jare.2014.02.006\n\n.","journal-title":"Journal of Advanced Research"},{"issue":"4","key":"23_CR48","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1177\/1357633x13487100","volume":"19","author":"Anne E Holland","year":"2013","unstructured":"Kotz, D., Gunter, C. A., Kumar, S., Weiner, J. P., Arora, S., Yttri, J., et al. (2014). Privacy and security in mobile health (mHealth) research. Alcohol Research: Current Reviews. \nhttps:\/\/doi.org\/10.1177\/1357633X13487100\n\n.","journal-title":"Journal of Telemedicine and Telecare"},{"key":"23_CR49","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358","volume-title":"Proceedings of the Eighth Symposium on Usable Privacy and Security \u2013 SOUPS\u201912","author":"E Chin","year":"2012","unstructured":"Chin, E., Felt, A. P., Sekar, V., & Wagner, D. (2012). Measuring user confidence in smartphone security and privacy. In Proceedings of the Eighth Symposium on Usable Privacy and Security \u2013 SOUPS\u201912. \nhttps:\/\/doi.org\/10.1145\/2335356.2335358\n\n."},{"issue":"5","key":"23_CR50","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/s00779-012-0531-4","volume":"17","author":"S Kang","year":"2013","unstructured":"Kang, S., Kim, J., & Hong, M. (2013). Go anywhere: User-verifiable authentication over distance-free channel for mobile devices. Personal and Ubiquitous Computing, 17(5), 933\u2013943. \nhttps:\/\/doi.org\/10.1007\/s00779-012-0531-4\n\n.","journal-title":"Personal and Ubiquitous Computing"},{"key":"23_CR51","doi-asserted-by":"publisher","unstructured":"Mart\u00ednez-P\u00e9rez, B., de la Torre-D\u00edez, I., & L\u00f3pez-Coronado, M. (2015). Privacy and security in mobile health apps: A review and recommendations. Journal of Medical Systems. \nhttps:\/\/doi.org\/10.1007\/s10916-014-0181-3\n\n.","DOI":"10.1007\/s10916-014-0181-3"},{"issue":"1","key":"23_CR52","first-page":"143","volume":"36","author":"S Arora","year":"2014","unstructured":"Arora, S., Yttri, J., & Nilsen, W. (2014). Privacy and security in mobile health (mHealth) research. Alcohol Research, 36(1), 143\u2013150. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1685862596?accountid=145382\n\n.","journal-title":"Alcohol Research"},{"key":"23_CR53","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/s12911-016-0258-7","volume":"16","author":"SK Garg","year":"2016","unstructured":"Garg, S. K., Lyles, C. R., Ackerman, S., Handley, M. A., Schillinger, D., Gourley, G., et al. (2016). Qualitative analysis of programmatic initiatives to text patients with mobile devices in resource-limited health systems. BMC Medical Informatics and Decision Making, 16, 16. \nhttps:\/\/doi.org\/10.1186\/s12911-016-0258-7\n\n.","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"23_CR54","doi-asserted-by":"publisher","first-page":"1360289","DOI":"10.1155\/2017\/1360289","volume":"2017","author":"Y Jiang","year":"2017","unstructured":"Jiang, Y., & Liu, J. (2017). Health monitoring system for nursing homes with lightweight security and privacy protection. Journal of Electrical and Computer Engineering, 2017, 1360289. \nhttps:\/\/doi.org\/10.1155\/2017\/1360289\n\n.","journal-title":"Journal of Electrical and Computer Engineering"},{"issue":"4","key":"23_CR55","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-017-0699-2","volume":"41","author":"P Mohit","year":"2017","unstructured":"Mohit, P., Amin, R., Karati, A., Biswas, G. P., & Khan, M. K. (2017). A standard mutual authentication protocol for cloud computing based health care system. Journal of Medical Systems, 41(4), 1\u201313. \nhttps:\/\/doi.org\/10.1007\/s10916-017-0699-2\n\n.","journal-title":"Journal of Medical Systems"},{"key":"23_CR56","unstructured":"Rakshitha, P., & Immanuel, A. (2017). A survey on context awareness security in healthcare. International Journal of Advanced Research in Computer Science, 8(3). Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1901458446?accountid=145382\n\n."},{"issue":"11","key":"23_CR57","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-016-0596-0","volume":"40","author":"M Wazid","year":"2016","unstructured":"Wazid, M., Zeadally, S., Das, A. K., & Odelu, V. (2016). Analysis of security protocols for mobile healthcare. Journal of Medical Systems, 40(11), 1\u201310. \nhttps:\/\/doi.org\/10.1007\/s10916-016-0596-0\n\n.","journal-title":"Journal of Medical Systems"},{"issue":"12","key":"23_CR58","doi-asserted-by":"publisher","first-page":"418","DOI":"10.3390\/app6120418","volume":"6","author":"K-H Yeh","year":"2016","unstructured":"Yeh, K.-H. (2016). BSNCare+: A robust IoT-oriented healthcare system with non-repudiation transactions. Applied Sciences, 6(12), 418. \nhttps:\/\/doi.org\/10.3390\/app6120418\n\n.","journal-title":"Applied Sciences"},{"issue":"1","key":"23_CR59","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s13246-014-0315-4","volume":"38","author":"MM Baig","year":"2015","unstructured":"Baig, M. M., Gholamhosseini, H., & Connolly, M. J. (2015). Mobile healthcare applications: System design review, critical issues and challenges. Australasian Physical & Engineering Sciences in Medicine, 38(1), 23\u201338. \nhttps:\/\/doi.org\/10.1007\/s13246-014-0315-4\n\n.","journal-title":"Australasian Physical & Engineering Sciences in Medicine"},{"issue":"12","key":"23_CR60","doi-asserted-by":"publisher","first-page":"642425","DOI":"10.1155\/2015\/642425","volume":"11","author":"Chin-I Lee","year":"2015","unstructured":"Chin-I, L., & Hung-Yu, C. (2015). An elliptic curve cryptography-based RFID authentication securing e-health system. International Journal of Distributed Sensor Networks. \nhttps:\/\/doi.org\/10.1155\/2015\/642425\n\n.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"12","key":"23_CR61","doi-asserted-by":"publisher","first-page":"392439","DOI":"10.1155\/2015\/392439","volume":"11","author":"Qiuxiang Dong","year":"2015","unstructured":"Dong, Q., Guan, Z., Gao, K., & Chen, Z. (2015). SCRHM: A secure continuous remote health monitoring system. International Journal of Distributed Sensor Networks. \nhttps:\/\/doi.org\/10.1155\/2015\/392439\n\n.","journal-title":"International Journal of Distributed Sensor Networks"},{"issue":"9","key":"23_CR62","doi-asserted-by":"publisher","first-page":"22419","DOI":"10.3390\/s150922419","volume":"15","author":"S Jiang","year":"2015","unstructured":"Jiang, S., Zhu, X., & Wang, L. (2015). EPPS: Efficient and privacy-preserving personal health information sharing in mobile healthcare social networks. Sensors, 15(9), 22419\u201322438. \nhttps:\/\/doi.org\/10.3390\/s150922419\n\n.","journal-title":"Sensors"},{"issue":"1","key":"23_CR63","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1016\/j.amjsurg.2015.04.017","volume":"211","author":"L Watson","year":"2016","unstructured":"Watson, L., Pathiraja, F., Depala, A., O\u2019Brien, B., & Beyzade, S. (2016). Ensuring safe communication in health care: A response to Johnston et al on their paper \u201cSmartphones let surgeons know WhatsApp: An analysis of communication in emergency surgical teams\u201d. The American Journal of Surgery, 211(1), 302\u2013303. \nhttps:\/\/doi.org\/10.1016\/j.amjsurg.2015.04.017\n\n.","journal-title":"The American Journal of Surgery"},{"issue":"6","key":"23_CR64","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1007\/s12083-014-0299-6","volume":"8","author":"H Yang","year":"2015","unstructured":"Yang, H., Kim, H., & Mtonga, K. (2015). An efficient privacy-preserving authentication scheme with adaptive key evolution in remote health monitoring system. Peer-To-Peer Networking and Applications, 8(6), 1059\u20131069. \nhttps:\/\/doi.org\/10.1007\/s12083-014-0299-6\n\n.","journal-title":"Peer-To-Peer Networking and Applications"},{"issue":"2","key":"23_CR65","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1017\/S1049023X12001677","volume":"28","author":"CM Bloem","year":"2013","unstructured":"Bloem, C. M., & Miller, A. C. (2013). Disasters and women\u2019s health: Reflections from the 2010 earthquake in Haiti. Prehospital and Disaster Medicine, 28(2), 150\u2013154. \nhttps:\/\/doi.org\/10.1017\/S1049023X12001677\n\n.","journal-title":"Prehospital and Disaster Medicine"},{"issue":"S1","key":"23_CR66","doi-asserted-by":"publisher","first-page":"s113","DOI":"10.1017\/S1049023X11003529","volume":"26","author":"C Bloem","year":"2011","unstructured":"Bloem, C., & Miller, A. (2011). (P1-20) disasters and women\u2019s health: The 2010 earthquake in Haiti. Prehospital and Disaster Medicine, 26(S1), s113. \nhttps:\/\/doi.org\/10.1017\/S1049023X11003529\n\n.","journal-title":"Prehospital and Disaster Medicine"},{"issue":"5","key":"23_CR67","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10916-013-9973-0","volume":"37","author":"C Lee","year":"2013","unstructured":"Lee, C., Hsu, C., Lai, Y., & Vasilakos, A. (2013). An enhanced mobile-healthcare emergency system based on extended chaotic maps. Journal of Medical Systems, 37(5), 1\u20139973. \nhttps:\/\/doi.org\/10.1007\/s10916-013-9973-0\n\n.","journal-title":"Journal of Medical Systems"},{"issue":"12","key":"23_CR68","doi-asserted-by":"publisher","first-page":"e114306","DOI":"10.1371\/journal.pone.0114306","volume":"9","author":"Seyedmostafa Safavi","year":"2014","unstructured":"Safavi, S., & Shukur, Z. (2014). Conceptual privacy framework for health information on wearable device. PLoS One, 9(12). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0114306\n\n.","journal-title":"PLoS ONE"},{"key":"23_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2015\/937914","volume":"2015","author":"Moon Sun Shin","year":"2015","unstructured":"Shin, M. S., Jeon, H. S., Ju, Y. W., Lee, B. J., & Jeong, S.-P. (2015). Constructing RBAC based security model in u-healthcare service platform. The Scientific World Journal. \nhttps:\/\/doi.org\/10.1155\/2015\/937914\n\n.","journal-title":"The Scientific World Journal"},{"issue":"3","key":"23_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017070101","volume":"7","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1\u201343.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"issue":"17","key":"23_CR71","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1503\/cmaj.120223","volume":"185","author":"I Mendez","year":"2013","unstructured":"Mendez, I., & VandenHof, M. C. (2013). Mobile remote-presence devices for point-of-care health care delivery. Canadian Medical Association Journal, 185(17), 1512\u20131516. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1476500625?accountid=145382\n\n.","journal-title":"Canadian Medical Association Journal"},{"issue":"2","key":"23_CR72","doi-asserted-by":"publisher","first-page":"P7","DOI":"10.1002\/aorn.12078","volume":"107","author":"L Hauk","year":"2018","unstructured":"Hauk, L. (2018). Benefits and challenges of remote video auditing in the OR. AORN Journal, 107(2), P7\u2013P10. \nhttps:\/\/doi.org\/10.1002\/aorn.12078\n\n.","journal-title":"AORN Journal"},{"issue":"1","key":"23_CR73","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/s00779-012-0618-y","volume":"18","author":"P Belsis","year":"2014","unstructured":"Belsis, P., & Pantziou, G. (2014). A k-anonymity privacy-preserving approach in wireless medical monitoring environments. Personal and Ubiquitous Computing, 18(1), 61\u201374. \nhttps:\/\/doi.org\/10.1007\/s00779-012-0618-y\n\n.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"23_CR74","doi-asserted-by":"publisher","first-page":"1345","DOI":"10.1007\/s10916-010-9595-8","volume":"36","author":"T Chen","year":"2012","unstructured":"Chen, T., Chung, Y., & Lin, F. Y. S. (2012). A study on agent-based secure scheme for electronic medical record system. Journal of Medical Systems, 36(3), 1345\u20131357. \nhttps:\/\/doi.org\/10.1007\/s10916-010-9595-8\n\n.","journal-title":"Journal of Medical Systems"},{"issue":"3","key":"23_CR75","doi-asserted-by":"publisher","first-page":"224","DOI":"10.2345\/0899-8205-47.3.224","volume":"47","author":"BA Moorman","year":"2013","unstructured":"Moorman, B. A., & Cockle, R. A. (2013). Medical device integration using mobile telecommunications infrastructure. Biomedical Instrumentation & Technology, 47(3), 224\u2013232. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1366370612?accountid=145382\n\n.","journal-title":"Biomedical Instrumentation & Technology"},{"key":"23_CR76","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1155\/2012\/195970","volume":"2012","author":"D Mulvaney","year":"2012","unstructured":"Mulvaney, D., Woodward, B., Datta, S., Harvey, P., Vyas, A., Thakker, B., et al. (2012). Monitoring heart disease and diabetes with mobile internet communications. International Journal of Telemedicine and Applications, 2012, 12. \nhttps:\/\/doi.org\/10.1155\/2012\/195970\n\n.","journal-title":"International Journal of Telemedicine and Applications"},{"issue":"3","key":"23_CR77","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s11276-007-0039-4","volume":"15","author":"W Lou","year":"2009","unstructured":"Lou, W., Liu, W., Zhang, Y., & Fang, Y. (2009). SPREAD: Improving network security by multipath routing in mobile ad hoc networks. Wireless Networks, 15(3), 279\u2013294. \nhttps:\/\/doi.org\/10.1007\/s11276-007-0039-4\n\n.","journal-title":"Wireless Networks"},{"issue":"11","key":"23_CR78","doi-asserted-by":"publisher","first-page":"e0142030","DOI":"10.1371\/journal.pone.0142030","volume":"10","author":"Markus Enenkel","year":"2015","unstructured":"Enenkel, M., See, L., Karner, M., \u00c1lvarez, M., Rogenhofer, E., Barald\u00e8s-Vallverd\u00fa, C., et al. (2015). Food security monitoring via mobile data collection and remote sensing: Results from the Central African Republic. PLoS One, 10(11). \nhttps:\/\/doi.org\/10.1371\/journal.pone.0142030\n\n.","journal-title":"PLOS ONE"},{"issue":"4","key":"23_CR79","doi-asserted-by":"publisher","first-page":"50","DOI":"10.12948\/issn14531305\/18.4.2014.05","volume":"18","author":"M Gheorghe","year":"2014","unstructured":"Gheorghe, M. (2014). Mobile cloud computing for telemedicine solutions. Informatica Economica, 18(4), 50\u201361. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1649081693?accountid=145382\n\n.","journal-title":"Informatica Economica"},{"key":"23_CR80","first-page":"443","volume-title":"Economic and social development: Book of proceedings","author":"Z Langovic","year":"2018","unstructured":"Langovic, Z., Pazun, B., & Grujcic, Z. (2018). Processor systems security impact on business systems. In Economic and social development: Book of proceedings (pp. 443\u2013449). Varazdin: Varazdin Development and Entrepreneurship Agency (VADEA). Retrieved from \nhttps:\/\/search.proquest.com\/docview\/2058257359?accountid=145382\n\n."},{"issue":"4","key":"23_CR81","doi-asserted-by":"publisher","first-page":"58","DOI":"10.5815\/ijieeb.2015.04.08","volume":"7","author":"S Sengupta","year":"2015","unstructured":"Sengupta, S., & Sarkar, P. (2015). An augmented level of security for Bluetooth devices controlled by smart phones and ubiquitous handheld gadgets. International Journal of Information Engineering and Electronic Business, 7(4), 58\u201375. \nhttps:\/\/doi.org\/10.5815\/ijieeb.2015.04.08\n\n.","journal-title":"International Journal of Information Engineering and Electronic Business"},{"issue":"2","key":"23_CR82","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1108\/IJRDM-05-2015-0065","volume":"44","author":"E Taylor","year":"2016","unstructured":"Taylor, E. (2016). Mobile payment technologies in retail: A review of potential benefits and risks. International Journal of Retail and Distribution Management, 44(2), 159\u2013177. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1767676353?accountid=145382\n\n.","journal-title":"International Journal of Retail and Distribution Management"},{"issue":"6","key":"23_CR83","doi-asserted-by":"publisher","first-page":"3907","DOI":"10.1007\/s10916-012-9862-y","volume":"36","author":"H Chen","year":"2012","unstructured":"Chen, H., Lo, J., & Yeh, C. (2012). An efficient and secure dynamic id-based authentication scheme for telecare medical information systems. Journal of Medical Systems, 36(6), 3907\u20133915. \nhttps:\/\/doi.org\/10.1007\/s10916-012-9862-y\n\n.","journal-title":"Journal of Medical Systems"},{"issue":"1","key":"23_CR84","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s10660-014-9165-0","volume":"15","author":"Y Chen","year":"2015","unstructured":"Chen, Y., & Chou, J. (2015). ECC-based untraceable authentication for large-scale active-tag RFID systems. Electronic Commerce Research, 15(1), 97\u2013120. \nhttps:\/\/doi.org\/10.1007\/s10660-014-9165-0\n\n.","journal-title":"Electronic Commerce Research"},{"issue":"1","key":"23_CR85","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s11036-008-0114-9","volume":"14","author":"A Gupta","year":"2009","unstructured":"Gupta, A., Kalra, A., Boston, D., & Borcea, C. (2009). MobiSoC: A middleware for mobile social computing applications. Mobile Networks and Applications, 14(1), 35\u201352. \nhttps:\/\/doi.org\/10.1007\/s11036-008-0114-9\n\n.","journal-title":"Mobile Networks and Applications"},{"issue":"1","key":"23_CR86","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s10257-010-0157-x","volume":"10","author":"J Kokem\u00fcller","year":"2012","unstructured":"Kokem\u00fcller, J., & Ro\u00dfnagel, H. (2012). Secure mobile sales force automation: The case of independent sales agencies. Information Systems and e-Business Management, 10(1), 117\u2013133. \nhttps:\/\/doi.org\/10.1007\/s10257-010-0157-x\n\n.","journal-title":"Information Systems and e-Business Management"},{"issue":"1","key":"23_CR87","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s00779-012-0628-9","volume":"18","author":"S Yazji","year":"2014","unstructured":"Yazji, S., Scheuermann, P., Dick, R. P., Trajcevski, G., & Jin, R. (2014). Efficient location aware intrusion detection to protect mobile devices. Personal and Ubiquitous Computing, 18(1), 143\u2013162. \nhttps:\/\/doi.org\/10.1007\/s00779-012-0628-9\n\n.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"2","key":"23_CR88","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10845-012-0654-5","volume":"25","author":"T Youn","year":"2014","unstructured":"Youn, T., Kim, J., & Lim, M. (2014). Study on two privacy-oriented protocols for information communication systems. Journal of Intelligent Manufacturing, 25(2), 339\u2013345. \nhttps:\/\/doi.org\/10.1007\/s10845-012-0654-5\n\n.","journal-title":"Journal of Intelligent Manufacturing"},{"issue":"2","key":"23_CR89","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10922-013-9299-8","volume":"22","author":"MA Al-fayoumi","year":"2014","unstructured":"Al-fayoumi, M. A., & Shilbayeh, N. F. (2014). Cloning SIM cards usability reduction in mobile networks. Journal of Network and Systems Management, 22(2), 259\u2013279. \nhttps:\/\/doi.org\/10.1007\/s10922-013-9299-8\n\n.","journal-title":"Journal of Network and Systems Management"},{"issue":"4","key":"23_CR90","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/s12083-014-0265-3","volume":"8","author":"S Moon","year":"2015","unstructured":"Moon, S., & Yoon, C. (2015). Information retrieval system using the keyword concept net of the P2P service-based in the mobile cloud environment. Peer-To-Peer Networking and Applications, 8(4), 596\u2013609. \nhttps:\/\/doi.org\/10.1007\/s12083-014-0265-3\n\n.","journal-title":"Peer-To-Peer Networking and Applications"},{"issue":"2","key":"23_CR91","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10207-014-0250-0","volume":"14","author":"M Spreitzenbarth","year":"2015","unstructured":"Spreitzenbarth, M., Schreck, T., Echtler, F., Arp, D., & Hoffmann, J. (2015). Mobile-sandbox: Combining static and dynamic analysis with machine-learning techniques. International Journal of Information Security, 14(2), 141\u2013153. \nhttps:\/\/doi.org\/10.1007\/s10207-014-0250-0\n\n.","journal-title":"International Journal of Information Security"},{"issue":"8","key":"23_CR92","doi-asserted-by":"publisher","first-page":"1881","DOI":"10.1007\/s00779-014-0788-x","volume":"18","author":"J Wang","year":"2014","unstructured":"Wang, J., Floerkemeier, C., & Sarma, S. E. (2014). Session-based security enhancement of RFID systems for emerging open-loop applications. Personal and Ubiquitous Computing, 18(8), 1881\u20131891. \nhttps:\/\/doi.org\/10.1007\/s00779-014-0788-x\n\n.","journal-title":"Personal and Ubiquitous Computing"},{"issue":"3","key":"23_CR93","first-page":"5","volume":"54","author":"N Hennig","year":"2018","unstructured":"Hennig, N. (2018). Assessing your security and privacy needs. Library Technology Reports, 54(3), 5. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/2020766935?accountid=145382\n\n.","journal-title":"Library Technology Reports"},{"issue":"3","key":"23_CR94","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/s11036-017-0870-5","volume":"22","author":"M Wang","year":"2017","unstructured":"Wang, M., Yan, Z., & Niemi, V. (2017). UAKA-D2D: Universal authentication and key agreement protocol in D2D communications. Mobile Networks and Applications, 22(3), 510\u2013525. \nhttps:\/\/doi.org\/10.1007\/s11036-017-0870-5\n\n.","journal-title":"Mobile Networks and Applications"},{"key":"23_CR95","unstructured":"Kaur, K., & Chuchra, R. (2017). Proposing enhanced Na Gaun Technique (Engt) for resource block allocation in Lte(long term evolution) systems for improving quality of service. International Journal of Advanced Research in Computer Science, 8(7). Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1931114880?accountid=145382\n\n."},{"issue":"2","key":"23_CR96","doi-asserted-by":"publisher","first-page":"245","DOI":"10.3390\/s17020245","volume":"17","author":"C Caballero-Gil","year":"2017","unstructured":"Caballero-Gil, C., Caballero-Gil, P., Molina-Gil, J., Mart\u00edn-Fern\u00e1ndez, F., & Loia, V. (2017). Trust-based cooperative social system applied to a carpooling platform for smartphones. Sensors, 17(2), 245. \nhttps:\/\/doi.org\/10.3390\/s17020245\n\n.","journal-title":"Sensors"},{"issue":"3","key":"23_CR97","doi-asserted-by":"publisher","first-page":"31","DOI":"10.3390\/fi9030031","volume":"9","author":"L Militano","year":"2017","unstructured":"Militano, L., Orsino, A., Araniti, G., & Iera, A. (2017). NB-IoT for D2D-enhanced content uploading with social trustworthiness in 5G systems. Future Internet, 9(3), 31. \nhttps:\/\/doi.org\/10.3390\/fi9030031\n\n.","journal-title":"Future Internet"},{"key":"23_CR98","unstructured":"Sherkar, R. M. (2015). An extension to android security framework. International Journal of Advanced Research in Computer Science, 6(1). Retrieved from \nhttps:\/\/search.proquest.com\/docview\/1674900061?accountid=145382\n\n."},{"issue":"2","key":"23_CR99","doi-asserted-by":"publisher","first-page":"929380","DOI":"10.1155\/2015\/929380","volume":"11","author":"Su-Wan Park","year":"2015","unstructured":"Su-Wan, P., Lim, J., & Kim, J. N. (2015). A secure storage system for sensitive data protection based on mobile virtualization. International Journal of Distributed Sensor Networks. \nhttps:\/\/doi.org\/10.1155\/2015\/929380\n\n.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"23_CR100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_24","volume-title":"Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics)","author":"A Dmitrienko","year":"2014","unstructured":"Dmitrienko, A., Liebchen, C., Rossow, C., & Sadeghi, A. R. (2014). On the (in)security of mobile two-factor authentication. In Lecture notes in computer science (including subseries lecture notes in artificial intelligence and lecture notes in bioinformatics). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45472-5_24\n\n."},{"issue":"2","key":"23_CR101","first-page":"218","volume":"20","author":"G \u0160kolc","year":"2018","unstructured":"\u0160kolc, G., & Markelj, B. (2018). Smart cars and information security TT \u2013 Pametni avtomobili in informacijska varnost. Varstvoslovje, 20(2), 218\u2013236. Retrieved from \nhttps:\/\/search.proquest.com\/docview\/2095680841?accountid=145382\n\n.","journal-title":"Varstvoslovje"},{"key":"23_CR102","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1016\/j.future.2017.03.029","volume":"83","author":"M. Shamim Hossain","year":"2018","unstructured":"Hossain, M. S., Muhammad, G., Abdul, W., Song, B., & Gupta, B. B. (2018). Cloud-assisted secure video transmission and sharing framework for smart cities. Future Generation Computer Systems. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.03.029\n\n.","journal-title":"Future Generation Computer Systems"},{"key":"23_CR103","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1016\/j.future.2017.09.082","volume":"82","author":"Andreas P. Plageras","year":"2018","unstructured":"Plageras, A. P., Psannis, K. E., Stergiou, C., Wang, H., & Gupta, B. B. (2018). Efficient IoT-based sensor BIG data collection\u2013processing and analysis in smart buildings. Future Generation Computer Systems. \nhttps:\/\/doi.org\/10.1016\/j.future.2017.09.082\n\n.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"23_CR104","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/JIOT.2018.2844727","volume":"6","author":"Licheng Wang","year":"2019","unstructured":"Wang, L., Li, L., Li, J., Li, J., Gupta, B. B., & Liu, X. (2018). Compressive sensing of medical images with confidentially homomorphic aggregations. IEEE Internet of Things Journal. \nhttps:\/\/doi.org\/10.1109\/JIOT.2018.2844727\n\n.","journal-title":"IEEE Internet of Things Journal"},{"issue":"16","key":"23_CR105","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1002\/pros.20492","volume":"66","author":"Hannes Steiner","year":"2006","unstructured":"Bowen, K., & Pistilli, M. D. (2012). Student preferences for mobile app usage. Research Bulletin. \nhttps:\/\/doi.org\/10.1002\/pros.20492\n\n.","journal-title":"The Prostate"},{"key":"23_CR106","first-page":"1191","volume-title":"Wirtschaftsinformatik","author":"D Homscheid","year":"2015","unstructured":"Homscheid, D., Kilian, T., & Schaarschmidt, M. (2015). Offen versus geschlossen-Welchen Zusammenhang gibt es zwischen Apple iOS-und Android-App-Entwicklern? In Wirtschaftsinformatik (pp. 1191\u20131205)."},{"issue":"6","key":"23_CR107","doi-asserted-by":"publisher","first-page":"3442","DOI":"10.1007\/s10664-018-9604-y","volume":"23","author":"Hanyang Hu","year":"2018","unstructured":"Hu, H., Bezemer, C. P., & Hassan, A. E. (2018). Studying the consistency of star ratings and the complaints in 1 & 2-star user reviews for top free cross-platform Android and iOS apps. Empirical Software Engineering. \nhttps:\/\/doi.org\/10.1007\/s10664-018-9604-y\n\n.","journal-title":"Empirical Software Engineering"},{"key":"23_CR108","doi-asserted-by":"publisher","DOI":"10.1101\/lm.529807","volume-title":"Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT 2016)","author":"B Saltaformaggio","year":"2016","unstructured":"Saltaformaggio, B., Choi, H., Johnson, K., Kwon, Y., Zhang, Q., Zhang, X., et al. (2016). Eavesdropping on fine-grained user activities within smartphone apps over encrypted network traffic. In Proceedings of the 10th USENIX Workshop on Offensive Technologies (WOOT 2016). \nhttps:\/\/doi.org\/10.1101\/lm.529807\n\n."},{"issue":"2","key":"23_CR109","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s13142-016-0455-z","volume":"7","author":"Harveen Kaur Ubhi","year":"2017","unstructured":"Ubhi, H. K., Kotz, D., Michie, S., van Schayck, O. C. P., & West, R. (2017). A comparison of the characteristics of iOS and Android users of a smoking cessation app. Translational Behavioral Medicine. \nhttps:\/\/doi.org\/10.1007\/s13142-016-0455-z\n\n.","journal-title":"Translational Behavioral Medicine"},{"key":"23_CR110","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSP.2010.202","volume":"9","author":"D Barrera","year":"2011","unstructured":"Barrera, D., & Van Oorschot, P. (2011). Secure software installation on smartphones. IEEE Security and Privacy, 9, 42\u201348. \nhttps:\/\/doi.org\/10.1109\/MSP.2010.202\n\n.","journal-title":"IEEE Security and Privacy"},{"key":"23_CR111","volume-title":"Proceedings of the network and distributed system security symposium","author":"J Han","year":"2013","unstructured":"Han, J., Yan, Q., Gao, D., Zhou, J., & Deng, R. H. (2013). Comparing mobile privacy protection through cross-platform applications. In Proceedings of the network and distributed system security symposium."},{"key":"23_CR112","doi-asserted-by":"publisher","DOI":"10.1109\/CCAA.2016.7813916","volume-title":"Proceeding \u2013 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016","author":"RK Kodali","year":"2017","unstructured":"Kodali, R. K., Jain, V., Bose, S., & Boppana, L. (2017). IoT based smart security and home automation system. In Proceeding \u2013 IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. \nhttps:\/\/doi.org\/10.1109\/CCAA.2016.7813916\n\n."},{"key":"23_CR113","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.2009.5333489.Active","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Y Michalevsky","year":"2014","unstructured":"Michalevsky, Y., Boneh, D., & Nakibly, G. (2014). Gyrophone: Recognizing speech from gyroscope signals. In 23rd USENIX Security Symposium (USENIX Security 14). \nhttps:\/\/doi.org\/10.1109\/IEMBS.2009.5333489.Active\n\n."},{"key":"23_CR114","doi-asserted-by":"publisher","DOI":"10.1145\/2939918.2939925","volume-title":"Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks \u2013 WiSec\u201916","author":"V Sivaraman","year":"2016","unstructured":"Sivaraman, V., Chan, D., Earl, D., & Boreli, R. (2016). Smart-phones attacking smart-homes. In Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks \u2013 WiSec\u201916. \nhttps:\/\/doi.org\/10.1145\/2939918.2939925\n\n."},{"issue":"3","key":"23_CR115","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08874417.2014.11645699","volume":"54","author":"Hyun Shik Yoon","year":"2014","unstructured":"Yoon, H. S., & Occe\u00f1a, L. (2014). Impacts of customers\u2019 perceptions on internet banking use with a smart phone. Journal of Computer Information Systems. \nhttps:\/\/doi.org\/10.1080\/08874417.2014.11645699\n\n.","journal-title":"Journal of Computer Information Systems"},{"key":"23_CR116","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660360","volume-title":"Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security \u2013 CCS\u201914","author":"D Shukla","year":"2014","unstructured":"Shukla, D., Kumar, R., Serwadda, A., & Phoha, V. V. (2014). Beware, your hands reveal your secrets! In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security \u2013 CCS\u201914. \nhttps:\/\/doi.org\/10.1145\/2660267.2660360\n\n."},{"key":"23_CR117","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.10","volume-title":"Proceedings \u2013 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE 2014","author":"AA Younis","year":"2014","unstructured":"Younis, A. A., Malaiya, Y. K., & Ray, I. (2014). Using attack surface entry points and reachability analysis to assess the risk of software vulnerability exploitability. In Proceedings \u2013 2014 IEEE 15th International Symposium on High-Assurance Systems Engineering, HASE 2014. \nhttps:\/\/doi.org\/10.1109\/HASE.2014.10\n\n."},{"key":"23_CR118","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-801290-1.00005-9","volume-title":"Cyber-physical attacks","author":"G Loukas","year":"2015","unstructured":"Loukas, G. (2015). Cyber-physical attack steps. In Cyber-physical attacks. Oxford: Butterworth-Heinemann. \nhttps:\/\/doi.org\/10.1016\/B978-0-12-801290-1.00005-9\n\n."},{"key":"23_CR119","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.trf.2018.04.025","volume":"56","author":"Johann Weber","year":"2018","unstructured":"Weber, J., Azad, M., Riggs, W., & Cherry, C. R. (2018). The convergence of smartphone apps, gamification and competition to increase cycling. Transportation Research Part F: Traffic Psychology and Behaviour. \nhttps:\/\/doi.org\/10.1016\/j.trf.2018.04.025\n\n.","journal-title":"Transportation Research Part F: Traffic Psychology and Behaviour"},{"key":"23_CR120","doi-asserted-by":"publisher","first-page":"836","DOI":"10.1016\/j.procs.2013.05.107","volume":"17","author":"X Wang","year":"2013","unstructured":"Wang, X., Shi, J., & Guo, L. (2013). Towards analyzing and improving service accessibility under resource enumeration attack. Procedia Computer Science, 17, 836\u2013843. \nhttps:\/\/doi.org\/10.1016\/j.procs.2013.05.107\n\n.","journal-title":"Procedia Computer Science"}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T17:09:18Z","timestamp":1577812158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":120,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_23","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}