Mobile Devices Vulnerabilities Article Swipe
Melissa A. Schneider
,
Md Minhaz Chowdhury
,
Shadman Latif
·
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.29007/kg5j
YOU?
·
· 2022
· Open Access
·
· DOI: https://doi.org/10.29007/kg5j
With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.
Related Topics
Concepts
Mobile device
Computer security
Computer science
Popularity
Mobile computing
Internet privacy
Secure coding
Mobile telephony
Mobile radio
Computer network
Information security
World Wide Web
Software security assurance
Security service
Psychology
Social psychology
Metadata
- Type
- article
- Language
- en
- Landing Page
- https://doi.org/10.29007/kg5j
- https://easychair.org/publications/open/qwrF
- OA Status
- bronze
- Cited By
- 3
- References
- 16
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4220665638
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4220665638Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.29007/kg5jDigital Object Identifier
- Title
-
Mobile Devices VulnerabilitiesWork title
- Type
-
articleOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2022Year of publication
- Publication date
-
2022-03-18Full publication date if available
- Authors
-
Melissa A. Schneider, Md Minhaz Chowdhury, Shadman LatifList of authors in order
- Landing page
-
https://doi.org/10.29007/kg5jPublisher landing page
- PDF URL
-
https://easychair.org/publications/open/qwrFDirect link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
bronzeOpen access status per OpenAlex
- OA URL
-
https://easychair.org/publications/open/qwrFDirect OA link when available
- Concepts
-
Mobile device, Computer security, Computer science, Popularity, Mobile computing, Internet privacy, Secure coding, Mobile telephony, Mobile radio, Computer network, Information security, World Wide Web, Software security assurance, Security service, Psychology, Social psychologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
3Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2, 2022: 1Per-year citation counts (last 5 years)
- References (count)
-
16Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4220665638 |
|---|---|
| doi | https://doi.org/10.29007/kg5j |
| ids.doi | https://doi.org/10.29007/kg5j |
| ids.openalex | https://openalex.org/W4220665638 |
| fwci | 0.58487186 |
| type | article |
| title | Mobile Devices Vulnerabilities |
| biblio.issue | |
| biblio.volume | 82 |
| biblio.last_page | 81 |
| biblio.first_page | 92 |
| topics[0].id | https://openalex.org/T11241 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9660000205039978 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1711 |
| topics[0].subfield.display_name | Signal Processing |
| topics[0].display_name | Advanced Malware Detection Techniques |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C186967261 |
| concepts[0].level | 2 |
| concepts[0].score | 0.7773209810256958 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q5082128 |
| concepts[0].display_name | Mobile device |
| concepts[1].id | https://openalex.org/C38652104 |
| concepts[1].level | 1 |
| concepts[1].score | 0.7411208748817444 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[1].display_name | Computer security |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.709412693977356 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C2780586970 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6637089252471924 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1357284 |
| concepts[3].display_name | Popularity |
| concepts[4].id | https://openalex.org/C144543869 |
| concepts[4].level | 2 |
| concepts[4].score | 0.5373619198799133 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q2738570 |
| concepts[4].display_name | Mobile computing |
| concepts[5].id | https://openalex.org/C108827166 |
| concepts[5].level | 1 |
| concepts[5].score | 0.49273112416267395 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q175975 |
| concepts[5].display_name | Internet privacy |
| concepts[6].id | https://openalex.org/C22680326 |
| concepts[6].level | 5 |
| concepts[6].score | 0.45090121030807495 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q7444867 |
| concepts[6].display_name | Secure coding |
| concepts[7].id | https://openalex.org/C95491727 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4351404905319214 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q992968 |
| concepts[7].display_name | Mobile telephony |
| concepts[8].id | https://openalex.org/C2781307350 |
| concepts[8].level | 2 |
| concepts[8].score | 0.24185290932655334 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q6887221 |
| concepts[8].display_name | Mobile radio |
| concepts[9].id | https://openalex.org/C31258907 |
| concepts[9].level | 1 |
| concepts[9].score | 0.19129857420921326 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q1301371 |
| concepts[9].display_name | Computer network |
| concepts[10].id | https://openalex.org/C527648132 |
| concepts[10].level | 2 |
| concepts[10].score | 0.1688953936100006 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q189900 |
| concepts[10].display_name | Information security |
| concepts[11].id | https://openalex.org/C136764020 |
| concepts[11].level | 1 |
| concepts[11].score | 0.16662731766700745 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q466 |
| concepts[11].display_name | World Wide Web |
| concepts[12].id | https://openalex.org/C62913178 |
| concepts[12].level | 4 |
| concepts[12].score | 0.10026103258132935 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q7554361 |
| concepts[12].display_name | Software security assurance |
| concepts[13].id | https://openalex.org/C29983905 |
| concepts[13].level | 3 |
| concepts[13].score | 0.07311603426933289 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q7445066 |
| concepts[13].display_name | Security service |
| concepts[14].id | https://openalex.org/C15744967 |
| concepts[14].level | 0 |
| concepts[14].score | 0.0 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q9418 |
| concepts[14].display_name | Psychology |
| concepts[15].id | https://openalex.org/C77805123 |
| concepts[15].level | 1 |
| concepts[15].score | 0.0 |
| concepts[15].wikidata | https://www.wikidata.org/wiki/Q161272 |
| concepts[15].display_name | Social psychology |
| keywords[0].id | https://openalex.org/keywords/mobile-device |
| keywords[0].score | 0.7773209810256958 |
| keywords[0].display_name | Mobile device |
| keywords[1].id | https://openalex.org/keywords/computer-security |
| keywords[1].score | 0.7411208748817444 |
| keywords[1].display_name | Computer security |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.709412693977356 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/popularity |
| keywords[3].score | 0.6637089252471924 |
| keywords[3].display_name | Popularity |
| keywords[4].id | https://openalex.org/keywords/mobile-computing |
| keywords[4].score | 0.5373619198799133 |
| keywords[4].display_name | Mobile computing |
| keywords[5].id | https://openalex.org/keywords/internet-privacy |
| keywords[5].score | 0.49273112416267395 |
| keywords[5].display_name | Internet privacy |
| keywords[6].id | https://openalex.org/keywords/secure-coding |
| keywords[6].score | 0.45090121030807495 |
| keywords[6].display_name | Secure coding |
| keywords[7].id | https://openalex.org/keywords/mobile-telephony |
| keywords[7].score | 0.4351404905319214 |
| keywords[7].display_name | Mobile telephony |
| keywords[8].id | https://openalex.org/keywords/mobile-radio |
| keywords[8].score | 0.24185290932655334 |
| keywords[8].display_name | Mobile radio |
| keywords[9].id | https://openalex.org/keywords/computer-network |
| keywords[9].score | 0.19129857420921326 |
| keywords[9].display_name | Computer network |
| keywords[10].id | https://openalex.org/keywords/information-security |
| keywords[10].score | 0.1688953936100006 |
| keywords[10].display_name | Information security |
| keywords[11].id | https://openalex.org/keywords/world-wide-web |
| keywords[11].score | 0.16662731766700745 |
| keywords[11].display_name | World Wide Web |
| keywords[12].id | https://openalex.org/keywords/software-security-assurance |
| keywords[12].score | 0.10026103258132935 |
| keywords[12].display_name | Software security assurance |
| keywords[13].id | https://openalex.org/keywords/security-service |
| keywords[13].score | 0.07311603426933289 |
| keywords[13].display_name | Security service |
| language | en |
| locations[0].id | doi:10.29007/kg5j |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4220651395 |
| locations[0].source.issn | 2398-7340 |
| locations[0].source.type | journal |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 2398-7340 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | EPiC series in computing |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | |
| locations[0].pdf_url | https://easychair.org/publications/open/qwrF |
| locations[0].version | publishedVersion |
| locations[0].raw_type | proceedings-article |
| locations[0].license_id | |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | EPiC Series in Computing |
| locations[0].landing_page_url | https://doi.org/10.29007/kg5j |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5056600049 |
| authorships[0].author.orcid | |
| authorships[0].author.display_name | Melissa A. Schneider |
| authorships[0].countries | US |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I79060951 |
| authorships[0].affiliations[0].raw_affiliation_string | East Stroudsburg University, East Stroudsburg, PA, USA |
| authorships[0].institutions[0].id | https://openalex.org/I79060951 |
| authorships[0].institutions[0].ror | https://ror.org/05atz9219 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I79060951 |
| authorships[0].institutions[0].country_code | US |
| authorships[0].institutions[0].display_name | East Stroudsburg University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Melissa Schneider |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | East Stroudsburg University, East Stroudsburg, PA, USA |
| authorships[1].author.id | https://openalex.org/A5064125900 |
| authorships[1].author.orcid | https://orcid.org/0000-0003-0145-6838 |
| authorships[1].author.display_name | Md Minhaz Chowdhury |
| authorships[1].countries | US |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I79060951 |
| authorships[1].affiliations[0].raw_affiliation_string | East Stroudsburg University, East Stroudsburg, PA, USA |
| authorships[1].institutions[0].id | https://openalex.org/I79060951 |
| authorships[1].institutions[0].ror | https://ror.org/05atz9219 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I79060951 |
| authorships[1].institutions[0].country_code | US |
| authorships[1].institutions[0].display_name | East Stroudsburg University |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Md Minhaz Chowdhury |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | East Stroudsburg University, East Stroudsburg, PA, USA |
| authorships[2].author.id | https://openalex.org/A5113968983 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Shadman Latif |
| authorships[2].countries | BD |
| authorships[2].affiliations[0].institution_ids | https://openalex.org/I103434671 |
| authorships[2].affiliations[0].raw_affiliation_string | American International University, Dhaka, Bangladesh |
| authorships[2].institutions[0].id | https://openalex.org/I103434671 |
| authorships[2].institutions[0].ror | https://ror.org/02j8ga255 |
| authorships[2].institutions[0].type | education |
| authorships[2].institutions[0].lineage | https://openalex.org/I103434671 |
| authorships[2].institutions[0].country_code | BD |
| authorships[2].institutions[0].display_name | American International University-Bangladesh |
| authorships[2].author_position | last |
| authorships[2].raw_author_name | Shadman Latif |
| authorships[2].is_corresponding | False |
| authorships[2].raw_affiliation_strings | American International University, Dhaka, Bangladesh |
| has_content.pdf | True |
| has_content.grobid_xml | True |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://easychair.org/publications/open/qwrF |
| open_access.oa_status | bronze |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Mobile Devices Vulnerabilities |
| has_fulltext | True |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T11241 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9660000205039978 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1711 |
| primary_topic.subfield.display_name | Signal Processing |
| primary_topic.display_name | Advanced Malware Detection Techniques |
| related_works | https://openalex.org/W2048100608, https://openalex.org/W2090296580, https://openalex.org/W4243905374, https://openalex.org/W1576249345, https://openalex.org/W1796074903, https://openalex.org/W4254967497, https://openalex.org/W1844259124, https://openalex.org/W4210272022, https://openalex.org/W1556486258, https://openalex.org/W2145498826 |
| cited_by_count | 3 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| locations_count | 1 |
| best_oa_location.id | doi:10.29007/kg5j |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4220651395 |
| best_oa_location.source.issn | 2398-7340 |
| best_oa_location.source.type | journal |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 2398-7340 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | EPiC series in computing |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://easychair.org/publications/open/qwrF |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | proceedings-article |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | EPiC Series in Computing |
| best_oa_location.landing_page_url | https://doi.org/10.29007/kg5j |
| primary_location.id | doi:10.29007/kg5j |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4220651395 |
| primary_location.source.issn | 2398-7340 |
| primary_location.source.type | journal |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 2398-7340 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | EPiC series in computing |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | |
| primary_location.pdf_url | https://easychair.org/publications/open/qwrF |
| primary_location.version | publishedVersion |
| primary_location.raw_type | proceedings-article |
| primary_location.license_id | |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | EPiC Series in Computing |
| primary_location.landing_page_url | https://doi.org/10.29007/kg5j |
| publication_date | 2022-03-18 |
| publication_year | 2022 |
| referenced_works | https://openalex.org/W3135931079, https://openalex.org/W2759025598, https://openalex.org/W2905223524, https://openalex.org/W1963971515, https://openalex.org/W6629239077, https://openalex.org/W2569439427, https://openalex.org/W2217289705, https://openalex.org/W6691782627, https://openalex.org/W2998255960, https://openalex.org/W2791265065, https://openalex.org/W2811168394, https://openalex.org/W2052602449, https://openalex.org/W1489067988, https://openalex.org/W3011091804, https://openalex.org/W2254761432, https://openalex.org/W2142145056 |
| referenced_works_count | 16 |
| abstract_inverted_index.at | 39 |
| abstract_inverted_index.in | 3 |
| abstract_inverted_index.of | 5, 59 |
| abstract_inverted_index.on | 67 |
| abstract_inverted_index.to | 20 |
| abstract_inverted_index.and | 10, 35, 62 |
| abstract_inverted_index.any | 28 |
| abstract_inverted_index.are | 24, 38 |
| abstract_inverted_index.for | 8, 44 |
| abstract_inverted_index.one | 63 |
| abstract_inverted_index.the | 1, 53 |
| abstract_inverted_index.This | 47 |
| abstract_inverted_index.With | 0 |
| abstract_inverted_index.even | 16 |
| abstract_inverted_index.have | 14 |
| abstract_inverted_index.many | 25 |
| abstract_inverted_index.more | 17 |
| abstract_inverted_index.risk | 41 |
| abstract_inverted_index.some | 32 |
| abstract_inverted_index.such | 50 |
| abstract_inverted_index.than | 42 |
| abstract_inverted_index.that | 55 |
| abstract_inverted_index.they | 13 |
| abstract_inverted_index.with | 27 |
| abstract_inverted_index.There | 23 |
| abstract_inverted_index.allow | 56 |
| abstract_inverted_index.might | 64 |
| abstract_inverted_index.paper | 48 |
| abstract_inverted_index.them, | 57, 61 |
| abstract_inverted_index.become | 15 |
| abstract_inverted_index.combat | 65 |
| abstract_inverted_index.higher | 40 |
| abstract_inverted_index.mobile | 6, 29, 68 |
| abstract_inverted_index.others | 43 |
| abstract_inverted_index.though | 31 |
| abstract_inverted_index.actors. | 22 |
| abstract_inverted_index.attacks | 66 |
| abstract_inverted_index.certain | 45 |
| abstract_inverted_index.device, | 30 |
| abstract_inverted_index.devices | 7 |
| abstract_inverted_index.methods | 58 |
| abstract_inverted_index.systems | 37 |
| abstract_inverted_index.targets | 19 |
| abstract_inverted_index.attacks. | 46 |
| abstract_inverted_index.business | 11 |
| abstract_inverted_index.devices. | 69 |
| abstract_inverted_index.elements | 54 |
| abstract_inverted_index.increase | 2 |
| abstract_inverted_index.personal | 9 |
| abstract_inverted_index.reasons, | 12 |
| abstract_inverted_index.discusses | 49 |
| abstract_inverted_index.features, | 34 |
| abstract_inverted_index.including | 52 |
| abstract_inverted_index.malicious | 21 |
| abstract_inverted_index.operating | 36 |
| abstract_inverted_index.attractive | 18 |
| abstract_inverted_index.exploiting | 60 |
| abstract_inverted_index.popularity | 4 |
| abstract_inverted_index.environments, | 33 |
| abstract_inverted_index.vulnerabilities | 26 |
| abstract_inverted_index.vulnerabilities, | 51 |
| cited_by_percentile_year.max | 96 |
| cited_by_percentile_year.min | 89 |
| countries_distinct_count | 2 |
| institutions_distinct_count | 3 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5699999928474426 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile.value | 0.58439838 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |