Work place: Computer Engineering Department, Istanbul University, Istanbul, 34320, Turkey
E-mail: aydinali@istanbul.edu.tr
Website: https://scholar.google.com.tr/citations?user=l4YY7DEAAAAJ&hl=en
Research Interests: Network Security, Network Architecture, Information Security, Computer Networks
Biography
Muhammed A. Aydin obtained his B.S. degree in computer engineering from Istanbul University in Istanbul, Turkey in 2001. He completed his Masters degree in computer engineering from Istanbul Technical University, Istanbul, Turkey in 2005. He received his Ph.D. degree in computer engineering from Istanbul University, Istanbul, Turkey in 2009. He has been working as an assistant professor in Istanbul University Department of Computer Engineering since 2009. His research areas in Computer Sciences, algorithms, Performance Modelling and Evaluation, Simulation and Modelling, Information Security and Reliability, Cryptography, Computer Networks, Communications and Network Protocols, Equipment, Network Architecture, Engineering and Technology. He has many academic titles such as Assistant Professor, Istanbul University, Mühendislik Fakültesi, Bilgisayar Mühendisliği, Continues Assistant Professor, Istanbul University, Mühendislik Fakültesi, Bilgisayar Mühendisliği. He has many publications in international journal. He was assigned to be an external and internal examiner for postgraduate students. He has been invited many times to be a speaker or visiting lecturer at different multinational companies. He sits on various panels with the government and other industry-related boards of study. He has many publications in international journals, conferences and book chapter. He has a patent, copyright and award.
By Asim S. Yuksel Abdul H. Zaim Muhammed A. Aydin
DOI: https://doi.org/10.5815/ijcnis.2014.12.02, Pub. Date: 8 Nov. 2014
The increasing popularity of smart devices have led users to complete all of their daily work with these devices. Users are now able to shop online, share information with the applications that they install on their smart devices. Installed applications gain access to various sensitive information, such as the user's contact list, phone number, location. However, there is no control mechanism in place that can check whether these applications are safe to install. Therefore, applications are installed according to the users’ decisions, without any limitations or warnings. As a result, users become the target of malicious applications, and the personal security and privacy are compromised. In this study, we investigate the security solutions that aim to protect the privacy and security of Android users. We reveal the shortcomings of mobile security solutions and shed light on the research community. Additionally, we present the taxonomy of Android-based mobile security solutions.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals