Results 171 to 180 of about 95,083 (206)
Some of the next articles are maybe not open access.
Conference on Data and Application Security and Privacy
This paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform, which, due to its open nature and widespread adoption, is a fertile ground for cyber threats.
Joseph Guan Quan Lim +6 more
semanticscholar +1 more source
This paper investigates an underexplored avenue of cybersecurity threats in mobile computing, with a particular focus on the Android platform, which, due to its open nature and widespread adoption, is a fertile ground for cyber threats.
Joseph Guan Quan Lim +6 more
semanticscholar +1 more source
Privacy issues of android application permissions: A literature review
Transactions on Emerging Telecommunications Technologies, 2019Android is an application platform for mobile devices. It comprises of the operating system, software framework, and core programs. This platform uses permissions to hide precious information about the user from untrusted apps.
Gulshan Shrivastava +3 more
semanticscholar +1 more source
(In)visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices
ACM Asia Conference on Computer and Communications SecurityIn Android 12, Google introduced a new security feature called the privacy indicator to protect users from spyware. The privacy indicator visually alerts users by displaying a green circle in the notification bar when an application accesses the camera ...
Yurak Choe +5 more
semanticscholar +1 more source
Tabbed Out: Subverting the Android Custom Tab Security Model
IEEE Symposium on Security and PrivacyMobile operating systems provide developers with various mobile-to-Web bridges to display Web pages inside native applications. A recently introduced component called Custom Tab (CT) provides an outstanding feature to overcome the usability limitations ...
Philipp Beer +3 more
semanticscholar +1 more source
Efficient Evolutionary Fuzzing for Android Application Installation Process
International Conference on Software Quality, Reliability and Security, 2019Source code analysis techniques used for automated software testing are insufficient to find security flaws in programs. Therefore, security researchers have been employing also fuzzing techniques for finding bugs and vulnerabilities in target programs ...
Veysel Hataş, Sevil Şen, John A. Clark
semanticscholar +1 more source
An Android Application for School Bus Tracking and Student Monitoring System
International Conference on Computational Intelligence and Computing Research, 2018The BUS TRACKING AND STUDENT MONITORING SYSTEM is a mobile application that ensure security to the students. The main objective of this application is to build a vehicle monitoring system for school children.
My Bus +6 more
semanticscholar +1 more source
2025 International Conference on Quantum Photonics, Artificial Intelligence, and Networking (QPAIN)
Automation has become indispensable in modern applications due to its efficiency, speed, and utility. In smart home systems, IoT-driven solutions are particularly critical for addressing security challenges and optimizing user convenience.
Sajeeb Bhattacharjee +4 more
semanticscholar +1 more source
Automation has become indispensable in modern applications due to its efficiency, speed, and utility. In smart home systems, IoT-driven solutions are particularly critical for addressing security challenges and optimizing user convenience.
Sajeeb Bhattacharjee +4 more
semanticscholar +1 more source
A Survey on Various Threats and Current State of Security in Android Platform
ACM Computing Surveys, 2019The advent of the Android system has brought smartphone technology to the doorsteps of the masses. The latest technologies have made it affordable for every section of the society.
P. Bhat, Kamlesh Dutta
semanticscholar +1 more source
International Conference on Future Data and Security Engineering, 2021
Anh-Duy Tran +3 more
semanticscholar +1 more source
Anh-Duy Tran +3 more
semanticscholar +1 more source
Security Enhancement for ATM Machine Using Mobile Application and IoT Technology
2024 5th International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV)Nowadays, ATMs are most commonly used to transact money. As a result, ATM fraud has become the most common problem in recent years. The primary reason for these types of operations is attacks against the 4-digit PIN (Personal Identification Number ...
D. Pradeep +3 more
semanticscholar +1 more source

