共查询到20条相似文献,搜索用时 15 毫秒
1.
Muhammad Asim Mubarik Zhijian Wang Yunyoung Nam Seifedine Kadry Muhammad Azam waqar 《计算机系统科学与工程》2021,37(2):169-186
In this research, we developed a plugin for our automated digital forensics framework to extract and preserve the evidence from the Android and the IOS-based mobile phone application, Instagram. This plugin extracts personal details from Instagram users, e.g., name, user name, mobile number, ID, direct text or audio, video, and picture messages exchanged between different Instagram users. While developing the plugin, we identified resources available in both Android and IOS-based devices holding key forensics artifacts. We highlighted the poor privacy scheme employed by Instagram. This work, has shown how the sensitive data posted in the Instagram mobile application can easily be reconstructed, and how the traces, as well as the URL links of visual messages, can be used to access the privacy of any Instagram user without any critical credential verification. We also employed the anti-forensics method on the Instagram Android’s application and were able to restore the application from the altered or corrupted database file, which any criminal mind can use to set up or trap someone else. The outcome of this research is a plugin for our digital forensics ready framework software which could be used by law enforcement and regulatory agencies to reconstruct the digital evidence available in the Instagram mobile application directories on both Android and IOS-based mobile phones. 相似文献
2.
The feature of brevity in mobile phone messages makes it difficult to distinguish lexical patterns to identify spam. This paper proposes a novel approach to spam classification of extremely short messages using not only lexical features that reflect the content of a message but new stylistic features that indicate the manner in which the message is written. Experiments on two mobile phone message collections in two different languages show that the approach outperforms previous content-based approaches significantly, regardless of language. 相似文献
3.
Many studies have been conducted to determine how to present information on mobile phones in such a way as to enhance usability, but those studies have not considered what information users need for effective decision making. To investigate what users want from mobile phones, we carried out a content preparation study. A questionnaire was constructed based on prior results from website content research, traditional usability studies on consumer electronics, and extensive study on various types of mobile phones; it was completed by 375 Chinese industrial participants. The statistical results revealed nine major factors of mobile phone content: information relating to input/search, functions, operation, multimedia functions, stored files, phone calls, help/service, accessory functions, and messages. Also, users of different ages and genders evidenced different requirements for mobile phone content, especially concerning accessory and multimedia functions. This study suggests guidelines for mobile phone designers targeted at the Chinese market and provides a base for content study of other information appliances. 相似文献
4.
《Journal of Network and Computer Applications》2007,30(1):186-208
Many multi-agent applications based on mobile agents require message propagation among group of agents. A fast and scalable group communication mechanism can considerably improve performance of these applications. Unfortunately, most of the existing approaches do not scale well and disseminate messages slowly when the number of agents grows.In this paper, we propose Sama, a new group communication mechanism, to speed up message delivery for a group of mobile agents on a heterogeneous internetwork. The main contribution of Sama is distribution and parallelization of message propagation in an efficient way to achieve scalability and high-speed of message delivery to group members. Sama uses message dispatcher objects (MDOs), which are stationary agents on each host, to propagate messages concurrently. The proposed mechanism is independent of agent locations and transparently delivers messages to the group using constant number of remote messages. It also transparently recovers from host failures. We also present a Hop-Ring protocol that considerably improves the performance of message dissemination in Sama. Our experimental results show that message propagation in Sama is significantly fast compared to the previously proposed methods. 相似文献
5.
This paper proposes a machine learning application to identify mobile phone users suspected of involvement in criminal activities. The application characterizes the behavioral patterns of suspect users versus non-suspect users based on usage metadata such as call duration, call distribution, interaction time preferences and text-to-call ratios while avoiding any access to the content of calls or messages. The application is based on targeted Bayesian network learning method. It generates a graphical network that can be used by domain experts to gain intuitive insights about the key features that can help identify suspect users. The method enables experts to manage the trade-off between model complexity and accuracy using information theory metrics. Unlike other graphical Bayesian classifiers, the proposed application accomplishes the task required of a security company, namely an accurate suspect identification rate (recall) of at least 50% with no more than a 1% false identification rate. The targeted Bayesian network learning method is also used for additional tasks such as anomaly detection, distinction between “relevant” and “irrelevant” anomalies, and for associating anonymous telephone numbers with existing users by matching behavioral patterns. 相似文献
6.
《Multimedia, IEEE Transactions on》2008,10(6):1022-1033
7.
随着手机功能的不断提升,越来越多的用户使用手机不仅仅是因为可以打电话、发短信,而是可以用来替代个人电脑的部分功能。在硬件条件受限的情况下,对手机应用程序进行优化可以提升手机的响应速度并且可以给用户提供一个良好的用户体验,文章给出了Android系统下应用开发的一些优化策略。 相似文献
8.
Patterson D.J. Xianghua Ding Kaufman S.J. Kah Liu Zaldivar A. 《Pervasive Computing, IEEE》2009,8(4):42-49
The Nomatic prototype system and communications ecosystem automatically infers users' place, activity, and availability from sensors on their handheld devices or laptop computers and then reports this information to their instant-messaging contacts.In our system, Nomatic (nomad and automatic), we explore a way to amplify and leverage this passive style of content creation by focusing on status messages. These short bits of text are usually created by users in the context of small communities of people who monitor each other for playor work-related distributed coordination. Status messages appear in instant-messaging (IM) clients as short customizable phrases such as "at lunch" or "out of the office." Commercial services also provide facilities for communicating status without IM (for example, Facebook, Twitter, and Jaiku). By simply attaching sensor data to the status information that users enter in IM, we can create a rich ecosystem of context-aware applications that benefit users. At the most basic level, keeping status content up to date helps mitigate the increasing problem of interruptions in mobile communications, but there are many other potential uses of such data. To be effective, we must keep this ecosystem in balance by supporting the user's ability to provide status information, supporting other users' ability to understand that data, and effectively motivating both types of users to keep their status information accurate. 相似文献
9.
黄开健 《数字社区&智能家居》2011,(19)
手机短信作为人们获取信息的重要途径,但随着其业务的日趋发展,大量非法和不良短信大肆侵入手机。系统是基于J2ME平台设计出一种非法短信屏蔽与举报软件.该系统由两大主要功能模块组成,一个是拦截非法短信模块,另一个是向相应的通信运营商设置的举报中心发送举报短信模块,且该系统凭借其平台无关性,可以运行于各种载有JAVA虚拟机的手机上。 相似文献
10.
11.
实时监测预警智能系统的实现 总被引:1,自引:0,他引:1
本系统将多种探测传感相融合,报警信息以短消息形式通过公用GSM网络传输到相关手机用户。系统还能大致估计入侵人数和入侵位置,自动记录入侵时间等,且能将报警信息自动归档存人数据库。文中对系统结构功能以及系统的算法软件设计作了基本介绍。 相似文献
12.
针对垃圾短信的现状,提出了一种结合信任技术、黑名单过滤技术、关键字过滤技术等的解决方案。该解决方案需要广大手机用户、移动运营商、政府监管部门的共同参与,才能最终达到治理垃圾短信的目的。 相似文献
13.
Ofer Bergman Andreas Komninos Dimitrios Liarokapis James Clarke 《Personal and Ubiquitous Computing》2012,16(6):757-766
Throughout their lives, people gather contacts on their mobile phones. Some of these are unused contacts—contacts that have not been used for a long time and are less likely to be used in future calls. These contacts compete for the users’ attention and the mobile phone’s limited screen capacity. To address this problem, we developed a prototype contact list interface called DMTR, which automatically demotes unused contacts by presenting them in a smaller font at the bottom of the contact list. In phase I of this research, we asked 18 participants to assess for how long they had not used each of their mobile phone contacts. Results show that 47% of all their contacts had not been used for over 6?months or had never been used at all. In phase II, we demoted these unused contacts using DMTR and asked our participants to locate contacts that they had recently used, with and without the prototype. Results indicate that the use of DMTR reduced both the number of key strokes and the retrieval time significantly. The majority of participants indicated that it was easier for them to access their contacts using DMTR and that they would like to use it in their next mobile phone. The results provide strong evidence for the demotion principle suggested by the user-subjective approach. 相似文献
14.
15.
16.
Feng Zhu Wei Zhu Mutka M.W. Ni L.M. 《Parallel and Distributed Systems, IEEE Transactions on》2007,18(11):1565-1577
The involvement of only the necessary users and service providers for service discovery in pervasive computing environments is challenging. Without prudence, users' and service providers' requests or service information, their identities, and their presence information may be sacrificed. We identify that the problem may be as difficult as a chicken-and-egg problem, in which both users and service providers want the other parties to expose sensitive information first. In this paper, we propose a progressive and probabilistic approach to solve the problem. Users and service providers expose partial information in turn and avoid unnecessary exposure if there is any mismatch. Although 1 or 2 bits of information are exchanged in each message, we prove that the process converges and that the false-positive overhead decreases quickly. Experiments and hypothesis tests show that security properties hold. We implemented the approach and the performance measurements show that the approach runs efficiently on PDAs. 相似文献
17.
Luca Becchetti Ugo Maria Colesanti Alberto Marchetti-Spaccamela Andrea Vitaletti 《Knowledge and Information Systems》2011,28(3):555-578
In this paper, we propose and investigate the effectiveness of fully decentralized, collaborative filtering techniques. These
are particularly interesting for use in pervasive systems of small devices with limited communication and computational capabilities.
In particular, we assume that items are tagged with smart tags (such as passive RFIDs), storing aggregate information about
the visiting patterns of users that interacted with them in the past. Users access and modify information stored in smart
tags transparently, by smart reader devices that are already available on commercial mobile phones. Smart readers use private
information about previous behavior of the user and aggregate information retrieved from smart tags to recommend new items
that are more likely to meet user expectations. Note that we do not assume any transmission capabilities between smart tags:
Information exchange among them is mediated by users’ collective and unpredictable navigation patterns. Our algorithms do
not require any explicit interaction among users and can be easily and efficiently implemented. We analyze their theoretical
behavior and assess their performance in practice, by simulation on both synthetic and real, publicly available data sets.
We also compare the performance of our fully decentralized solutions with that of state-of-the-art centralized strategies. 相似文献
18.
本文介绍了移动计算的特点,根据目前无线网络和移动设备应用程序设计的局限性,提出了基于J2ME+Agent的多线程的移动应用平台的设计方案,并引入了中间件思想。本文最后把该方案应用一个面向移动用户的云南省大型仪器协作共用网,从而证实了该平台在移动系统环境中具有较高的适应性和良好的使用性。 相似文献
19.
Mobile phone data help us to understand human activities. Researchers have investigated the characteristics and relationships of human activities and regional function using information from physical and virtual spaces. However, how to establish location mapping between spaces to explore the relationships between mobile phone call activity and regional function remains unclear. In this paper, we employ a self-organizing map (SOM) to map locations with 24-dimensional activity attributes and identify relationships between users' mobile phone call activities and regional functions. We apply mobile phone call data from Harbin, a city in northeast China, to build the location mapping relationships between user clusters of mobile phone call activity and points of interest (POI) composition in geographical space. The results indicate that for mobile phone call activities, mobile phone users are mapped to five locations that represent particular mobile phone call patterns. Regarding regional functions, we identified nine unique types of functional areas that are related to production, business, entertainment and education according to the patterns of users and POI proportions. We then explored the correlations between users and POIs for each type of area. The results of this research provide new insights into the relationships between human activity and regional functions. 相似文献
20.
校园教育互联系统,是一个基于物联网和移动互联网应用,运用射频识别技术、无线通讯技术、网络通讯技术、云存储技术开发的,学生、家庭、学校、教师之间无缝联接沟通的全新运营模式的校园教育管理沟通系统平台,实现了真正意义上的校园信息智能化、家校沟通便捷化。该系统充分利用手机短信、定位、摄像头服务、RFID识别等功能,获取学生在校相关信息,并将其存储至云平台中,家长也可以登录终端应用系统,随时随地操纵相关硬件设备查询学生的在校信息,从而达到增强学校和家长之间联系,实现学校和家长更好沟通的目的。 相似文献