Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mobile Phone Security and Forensics - A Practical Approach. Springer Briefs in Electrical and Computer Engineering Springer, (2012)Ramifications of mobile phone advanced O/S on security perceptions and practices., and . CSS, page 33-38. IEEE, (2011)Surveying Users' Opinions and Trends towards Mobile Payment Issues., , and . TAMoCo, volume 169 of Frontiers in Artificial Intelligence and Applications, page 9-19. IOS Press, (2008)An empirical study on green practices of mobile phone users., , and . Wireless Networks, 22 (7): 2203-2220 (2016)Communication Security & Cyberbullying: A Review of the Legal Issues., , , and . SEEDA-CECNSM, page 66-71. ACM, (2016)Epidemic model for malware targeting telephony networks., , , and . ICT, page 1-5. IEEE, (2016)Mobile Phone Downloading among Students: The Status and Its Effect on Security., and . ICMB, page 235-242. IEEE, (2011)Intercepting Mobile Phone Calls and Short Messages Using a GSM Tester.. CN, volume 160 of Communications in Computer and Information Science, page 281-288. Springer, (2011)PBX Security and Forensics - A Practical Approach. Springer Briefs in Electrical and Computer Engineering Springer, (2013)PINEPULSE: A System to PINpoint and Educate Mobile Phone Users with Low Security., and . ICGS3/e-Democracy, volume 99 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 62-66. Springer, (2011)