Skip to main content

Research Repository

Advanced Search

All Outputs (3)

A comparative study of android users’ privacy preferences under the runtime permission model (2017)
Journal Article
Andriotis, P., Li, S., Spyridopoulos, T., & Stringhini, G. (2017). A comparative study of android users’ privacy preferences under the runtime permission model. Lecture Notes in Artificial Intelligence, 10292 LNCS, 604-622. https://doi.org/10.1007/978-3-319-58460-7_42

© Springer International Publishing AG 2017. Android users recently were given the ability to selectively grant access to sensitive resources of their mobile devices when apps request them at runtime. The Android fine-grained runtime permission model... Read More about A comparative study of android users’ privacy preferences under the runtime permission model.

Real-time monitoring of privacy abuses and intrusion detection in android system (2015)
Journal Article
Li, S., Chen, J., Spyridopoulos, T., Andriotis, P., Ludwiniak, R., & Russell, G. (2015). Real-time monitoring of privacy abuses and intrusion detection in android system. Lecture Notes in Artificial Intelligence, 9190, 379-390. https://doi.org/10.1007/978-3-319-20376-8_34

© Springer International Publishing Switzerland 2015. In this paper, we investigated the definition of privacy, privacy abuse behaviours, and the privacy abuse in Android systems, which may be very useful for identifying the malicious apps from ‘norm... Read More about Real-time monitoring of privacy abuses and intrusion detection in android system.

On the development of automated forensic analysis methods for mobile devices (2014)
Journal Article
Andriotis, P., Tryfonas, T., Oikonomou, G., Li, S., Tzermias, Z., Xynos, K., …Prevelakis, V. (2014). On the development of automated forensic analysis methods for mobile devices. Lecture Notes in Artificial Intelligence, 8564 LNCS, 212-213. https://doi.org/10.1007/978-3-319-08593-7_17

We live in a connected world where mobile devices are used by humans as valuable tools. The use of mobile devices leaves traces that can be treasured assets for a forensic analyst. Our aim is to investigate methods and exercise techniques that will m... Read More about On the development of automated forensic analysis methods for mobile devices.