Abdul H. Zaim

Work place: Istanbul Commerce University/Computer Engineering Department, Istanbul, 34378, Turkey

E-mail: azaim@ticaret.edu.tr

Website:

Research Interests: Computer systems and computational processes, Computer Architecture and Organization, Computer Networks, Network Architecture, Data Structures and Algorithms

Biography

Abdul H. Zaim received his B.S. degree (with honor) in computer science and engineering from Yildiz Technical University, Istanbul, Turkey, in 1993, his MSc degree in computer engineering from Bogazici University, Istanbul, Turkey, in 1996, and his PhD degree in electrical and computer engineering from North Carolina State University, Raleigh, in 2001. As a teaching assistant and lecturer, he taught several courses at Istanbul and Yeditepe Universities between 1993 and 1997. In 1998 to 1999, he was with Alcatel, Raleigh, North Carolina. Between 2001 and 2002 he worked at MCNC, Raleigh, NC. He worked as a full professor for Istanbul University until 2010. He is currently a professor in Istanbul Commerce University Computer Engineering Department and director of Information Technology Application and Research Center. His research interests include computer performance evaluation, satellite and high-speed networks, network protocols, optical networks, and computer network design.

Author Articles
A Comprehensive Analysis of Android Security and Proposed Solutions

By Asim S. Yuksel Abdul H. Zaim Muhammed A. Aydin

DOI: https://doi.org/10.5815/ijcnis.2014.12.02, Pub. Date: 8 Nov. 2014

The increasing popularity of smart devices have led users to complete all of their daily work with these devices. Users are now able to shop online, share information with the applications that they install on their smart devices. Installed applications gain access to various sensitive information, such as the user's contact list, phone number, location. However, there is no control mechanism in place that can check whether these applications are safe to install. Therefore, applications are installed according to the users’ decisions, without any limitations or warnings. As a result, users become the target of malicious applications, and the personal security and privacy are compromised. In this study, we investigate the security solutions that aim to protect the privacy and security of Android users. We reveal the shortcomings of mobile security solutions and shed light on the research community. Additionally, we present the taxonomy of Android-based mobile security solutions.

[...] Read more.
Other Articles