43 BD. Deb, Mohammad M Fuad, “Use of Mobile Application to Improve Active Learning and Student Participation in the Computer Science Classroom”, ACM SIGCSE 2014, 2014.
44 S. Li, R. D. Murch, “An investigation into baseband techniques for single-channel full-duplex wireless communication systems”, IEEE Trans. Wireless Commun., vol. 13, no. 9, pp. 4794-4806, Sep. 2014.
45 H. Liu, J. Han, and H. Motoda, “Uncovering deception in social media,” Social Netw. Anal. Mining, vol. , no. 1, pp. 1–2, 2014.
46 Hu, J. Tang, and H. Liu, “Online social spammer detection,” in Proc. 28th AAAI Conf. Artif. Intell., 2014, pp. 59–65.
47 Twitter Inc., “Twitter’s IPO filing,” Oct 2016. Online. Available: https://goo.gl/pbXxHh,Last checked Dec. 07, 2016.
48 E. Ferrara, O. Varol, C. Davis, F. Menczer, and A. Flammini, “The rise of social bots,” Commun. ACM, vol. 59, no. 7, pp. 96–104, 2016.
49 M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, “Catching synchronized behaviorsin large networks: A graph mining approach,” ACM Trans. Knowl. Discovery Data, vol. 10, no. 4, 2016, Art. no. 35.
55 S. Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, “Fame for sale: Efficient detection of fake Twitter followers,” Decision Support Syst., vol. 80, pp. 56–71, 2015
51 M. Jiang, P. Cui, A. Beutel, C. Faloutsos, and S. Yang, “Inferring lockstep behavior from connectivity pattern in large graphs,” Knowl. Inf. Syst., vol. 48, no. 2, pp. 399–428, 2015.
52 ” M. Giatsoglou, D. Chatzakou, N. Shah, A. Beutel, C. Faloutsos, and A. Vakali, “ND- Sync: Detecting synchronized fraud activities,” in Proc. 19th Pacific Asia Conf. Advances Knowl. Discovery Data Mining, 2015, pp. 201–214.
53 R. Yu, X. He, and Y. Liu, “GLAD: Group anomaly detection in social media analysis,”ACM Trans. Knowl. Discovery Data, vol. 10, no. 2, pp. 1–22, 2015
54 “Visa Mobile 3D Secure Specification for M-commerce Security”,
55 S Cresci, R. Di Pietro, M. Petrocchi, A. Spognardi, and M. Tesconi, “DNA-inspired online behavioral modeling and its application to spambot detection,” IEEE Intell. Syst., vol. 31, no. 5, pp. 58–64, Sep./Oct. 2016.
56 M. Avvenuti, S. Bellomo, S. Cresci, M. N. La Polla, and M. Tesconi, “Hybrid crowdsensing: A novel paradigm to combine the strengths of opportunistic and participatory crowdsensing,” in Proc. 26th World Wide Web Conf., 2017.
57 Driving force for M-commerce success by Jason J. Zhang, Yufei Yuan, and Norm Archer ,Michael G. DeGroote School of Business,McMaster University,Hamilton, Ontario,
58 D. P. Kroese, T. Brereton, T. Taimre, and Z. I. Botev, “Why the Monte Carlo method is so important today,” Wiley Interdisciplinary Rev.: Computat. Statist., vol. 6, no. 6, pp. 386–392, 2014.
59 Donatus Mathenge Githui (corresponding author) School of Business, Kimathi University College of Technology Kenya
60 B. Viswanath, et al., “Towards detecting anomalous user behavior in online socialnetworks,” in Proc. 23rd USENIX Secur. Symp., 2014, pp. 223–238.
61 X. Ruan, Z. Wu, H. Wang, and S. Jajodia, “Profiling online social behaviors for compromised account detection,” IEEE Trans. Inf. Forensics Secur., vol. 11, no. 1, pp. 176–87, Jan. 2016.
62 ‘ How the French are Succeeding with M-commerce”, Wireless developerNetwork
Juul, Niels C. and Jorgensen, N. (2001), “WAP may stumble over the Gateway”,
Parts of the research in this thesis have been published:
• Chapter 4 includes the proposed SET framework, presented at the 2015 IADIS International E-Society Conference .and its generalization reported at the 2nd International Conference on Information and Communication Technologies (ICT2014)
• Chapter 5 incorporates two account-based mobile payment protocols, KSLv1 protocol presented at the 2014 International Conference on Cryptology in India (Indocrypt2014) KSL03a and KSLv2 protocol presented at the 2016 International Conference on Information Technology: Coding and Computing (ITCC2004) KSL04c, respectively.
• Chapter 6 presents the results of implementation of KSLv1 protocol re- ported at the 2017 IEEE Conference on Cybernetics and Intelligent Systems
• The proposed accountability logic in Chapter 7 was presented at the ITCC2017 conference
• Chapter 8 includes the proposed limited-used key generation technique for Internet transactions presented at the 5th International Workshop on Information Security Applications 2018