The main purpose of this study is to discuss the different comparative studies on mobile operating system. From the last few years with the use of mobile, the mobile technology is also increasing at a fast speed. Now a day's different mobile phone companies are competing in the market each having its own hardware and software. Each company mobile phone has its own interface and they are looking to provide new features to their customers. Each company use different operating system like Apple using iOS, Samsung using Android and Nokia using Symbian. In this study we will give, you review of different comparative studies on mobile operating systems done by different authors.
The aim of this study is to present different types of steganography in brief and to give a special attention to audio steganography technique because a huge number of audio files are exchanged through the networks. Nowadays the widening of attacker's abilities to access the private and public information transmitted over public communication system makes way for highlighting a tool that guarantees the secure transmission of hidden information. Information hiding was a common security term that mainly includes three techniques: cryptography, steganography and watermark. Cryptography was an ancient form that is used for confidential data. Steganography is a popular tool that uses digital medium to hide confidential data in innocent carrier such as image, audio, text and video. Steganography is in fact a complement for the earlier data hiding technique cryptography. However watermark is used for copyright protection. Audio steganography is technique that hides any type of secret data in cover audio file. This study also discusses the main requirements of steganography methods and how those methods achieve them. Furthermore it shows steganography domain and, carriers and information hiding techniques used in audio.
During the coronavirus disease 2019 (COVID-19) pandemic outbreak, the lockdown of all activities including schools and universities became a normal habit, forcing educational institutes to find new ways to ensure the continuity of the learning process. E-learning is considered the best choice at this stage whereas using video conferencing or virtual meeting applications (VM) apps is the most common solution. In this research, security issues and possible cyber-attacks that may occur due to the use of the most popular VM apps used by educational institutes (i.e., Zoom, Microsoft Teams, and Google meet) are discussed. Moreover, the security features of these applications are briefly explained. Furthermore, a comprehensive comparison from a cybersecurity perspective between VM apps was made. The results show that Google Meet was the most secure against cyber-attacks, followed by the Microsoft Teams and finally the Zoom app.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.