Results 11 to 20 of about 86,113 (173)

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]

open access: yes, 2014
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre   +3 more
core   +5 more sources

Comparing Smartphone Apps for Traditional Chinese Medicine and Modern Medicine in China: Systematic Search and Content Analysis

open access: yesJMIR mHealth and uHealth, 2021
BackgroundTraditional Chinese medicine (TCM) is an integral part of mainstream medicine in China, with theories and practices that are completely different from modern medicine.
Liu, Xiao Hang   +4 more
doaj   +1 more source

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]

open access: yes, 2011
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre   +3 more
core   +8 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Early Detection of Dengue Fever Outbreaks Using a Surveillance App (Mozzify): Cross-sectional Mixed Methods Usability Study

open access: yesJMIR Public Health and Surveillance, 2021
BackgroundWhile early detection and effective control of epidemics depend on appropriate surveillance methods, the Philippines bases its dengue fever surveillance system on a passive surveillance method (notifications from barangay/village health centers,
Herbuela, Von Ralph Dane Marquez   +7 more
doaj   +1 more source

Android Kötücül Yazılım Tespit Sistemleri İncelemesi

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
Akıllı telefonların hayatımıza girmesiyle birlikte akıllı telefonları kullanan kullanıcı sayısı her geçen gün artarak devam etmektedir. Akıllı telefonların fazla talep görmesindeki neden, insanların bir cihazla istedikleri işleri tek dokunuşla kolaylıkla
Ömer KİRAZ, İbrahim Alper DOĞRU
doaj   +4 more sources

Precision planter monitoring system based on mobile communication network

open access: yesIET Networks, EarlyView., 2022
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Pengembangan Sistem Piconet Pervasive pada Transmisi Data Rate Video Streaming Melalui Bluetooth

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2017
The purpose of this research is to develop Piconet Pervasive system from previous research that analyzed security system and optimized system performance of video streaming rate data transmission over Bluetooth Piconet Pervasive network, using Symbian OS
Andi Hasad, Abdul Hafid Paronda
doaj   +1 more source

Home - About - Disclaimer - Privacy