Results 181 to 190 of about 8,962 (209)
Some of the next articles are maybe not open access.

Security controls for Android

2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN), 2012
The use of Smartphones in business has grown in the recent years bringing new ways to create and share information. Among the operating systems used by smartphones, Android has the most growing usage rate. Most recent Android versions have some security controls; however, there is a lack in the use of strong security controls for Android 2.3 ...
Ruben Jonathan Garcia Vargas   +3 more
openaire   +1 more source

Security implications of Android

Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, 2011
Smartphones blur the boundaries between the traditional feature phone and a general purpose computer such as a laptop. The Android OS, from Google, was created to be an open alternative to fully closed platforms such as Apple's iOS or Microsoft's Windows Phone OS.
openaire   +1 more source

Android vulnerabilities and security

2017 International Conference on Computing and Communication Technologies for Smart Nation (IC3TSN), 2017
Market share of Android device is increasing and these devices are now important part of one's daily routine. Most of our sensative data is stored in these devcies. This paper focuses on various vulnerabilities which an Android user might be exposed to and ways protect themselves from these vulnerabilities.
Saurav Yadav   +4 more
openaire   +1 more source

Android Security Architecture

2012
In Chapter 2, we looked at a simple example of how we can protect information using encryption. However, that example did not make use of Android’s built-in security and permissions architecture. In this chapter, we will take a look at what Android is able to offer the developer and end user with regard to security.
openaire   +1 more source

Learning mobile security with android security labware

Proceeding of the 44th ACM technical symposium on Computer science education, 2013
As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or explored in the mobile computing paradigm where traditional security threats are also evolving.
Minzhe Guo   +4 more
openaire   +1 more source

Securing Android Phones against Potential Thefts: AhMyth Android RAT

2020
Android Smartphones have become an everyday companion for the modern man. Day by day, new improved versions of phones are being introduced into the market. Everyone who owns a smartphone adds more personal data on it daily. Therefore there is a bigger need to secure these devices.
Lisha Varghese   +3 more
openaire   +1 more source

Android applications and security breach

2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), 2016
The evolution of the Technology and its use in the daily life and business has made that the people trust in mobile devices to perform important activities. Hackers have focus in them due to the information they can get. In recent years, the growth of malware towards mobile devices has been outstanding.
Diana Gabriela Noemi Benitez-Mejia   +2 more
openaire   +1 more source

Android Security and Permissions

2015
The fact that you are reading this book, and are thinking of developing applications for Android, means you have certainly been exposed to ongoing security issues that are an inescapable fact of modern operating systems and programs. Catchy names like Heartbleed and Shellshock have brought security to the forefront of even nontechnical consumers ...
openaire   +1 more source

WSafe – Security Android Application

The usage of smart phones equipped with GPS navigation unit have increased rapidly from 3% to more than 20% in the past five years. Hence, a smart phone can be used efficiently for personal safety or various other protection purposes especially for women. This app can be activated by a single click when the user feels she is in danger. This application
Lakde, Divya   +4 more
openaire   +1 more source

Comparative analysis of Android and iOS from security viewpoint

Computer Science Review, 2021
Shivi Garg, Niyati Baliyan
exaly  

Home - About - Disclaimer - Privacy