Results 71 to 80 of about 8,962 (209)
No App, No Entry: Conceptualizing Digital Technology Captivity in Service Access
ABSTRACT We introduce Digital Technology Captivity (DTC), a form of consumer vulnerability that arises when digital technologies become the mandatory gateway to essential services. When access is tied to systems that feel unfamiliar, complex, or intimidating—and when preferred alternatives are limited—consumers may experience heightened vulnerability ...
Carolyn Wilson‐Nash +4 more
wiley +1 more source
Key Technical Fields and Future Outlooks of Space Manipulators: A Survey
This paper systematically reviews the technological development of space manipulators, emphasizing the unique challenges posed by space environments. It examines four areas: structural design, modeling, planning, and control, while introducing typical ground test platforms.
Gang Chen +12 more
wiley +1 more source
Case Study: PQC Migration for Android Strongbox Keymaster on Samsung Galaxy Mobile Devices
Advances in quantum computers and their algorithms are significantly changing modern cyber-security systems. Post-Quantum Cryptography (PQC) has been standardized to protect modern security systems from large-scale and reliable quantum computing. However,
Sungmin Lee +3 more
doaj +1 more source
Abstract Research Summary We study how the entry of a rival platform affects the strategies of the incumbent's complementors. The latter face a trade‐off: While the entry threatens their benefits from indirect network effects, it also allows them to escape intense within‐platform competition.
Johannes Loh, Ambre Elsas‐Nicolle
wiley +1 more source
Android Access Control Extension
The main objective of this work is to analyze and extend security model of mobile devices running on Android OS. Provided security extension is a Linux kernel security module that allows the system administrator to restrict program's capabilities with ...
Anton Baláž +2 more
doaj +1 more source
CONTEXT BASED ANDROID APPLICATIONADMINISTRATIVE ACCESS CONTROL (CBAA–AAC) FOR SMART PHONES [PDF]
Android applications in smart phones are generally towards provide greater flexibility and convince for users. Considering the fact that the Android applications are having privilege to access data and resources in mobile after it gets installed (one ...
S. Sharavanan, R.M. Balajee
doaj
Roe deer is a species that hides their neonates as an anti‐predator strategy. This may prove efficient against mammalian predators, such as the red fox; however, it might be an ecological trap as large numbers of fawns are killed by tractors with harvesters each year during grass harvest.
Thomas Vogler +2 more
wiley +1 more source
Android Malware Detection Using API Calls and Permissions With Random Forest Classifier
Android malware poses a persistent and evolving threat to mobile security, considering its capability to compromise sensitive user data and evade traditional detection methods. While signature-based approaches remain effective against known threats, they
Abdul Museeb +5 more
doaj +1 more source
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam +9 more
wiley +1 more source
Design of intelligent locks based on the triple KeeLoq algorithm
KeeLoq algorithm with high security was usually used in wireless codec. Its security lack is indicated in this article according to the detailed rationale and the introduction of previous attack researches.
Huibin Chen, Jing Liu, Cheng-Fu Yang
doaj +1 more source

