Here we present a standard format for academic papers, using a two column layout.
This example lets you get started right away, and includes some sample text and formulae to help learn how to write LaTeX.
Click below to get started.
Can a Smartphone be specifically identified according to the behavior or actions of the
user? Smartphones are nowadays widely used especially due to their numerous functionalities. These devices act like small computers as they have many functions such as internet
connection, emailing, chats, social media among others. A lot of traffic is therefore generated
from these devices and adversaries may use the traffic to attack the smartphones. Traffic
generated by smartphones may be used to interfere with user privacy. Information collected
from the traffic can be used to create specific fingerprints that will identify a particular device. This is seen from the two articles reviewed in this paper. Both papers investigate how
traffic from a smartphone can be used by attackers to infringe user privacy. Though different
methods are used in the studies, the results indicate that user privacy can be infringed.