[HTML][HTML] Unmasking privacy apprehension: A bibliometric review of mobile sharing economy applications
The emergence of mobile applications (apps) that utilize sharing economy concepts has
revolutionized multiple industries, including transportation, accommodation, healthcare, and …
revolutionized multiple industries, including transportation, accommodation, healthcare, and …
Mobile recommender systems: An overview of technologies and challenges
The use of mobile devices in combination with the rapid growth of the internet has generated
an information overload problem. Recommender systems is a necessity to decide which of …
an information overload problem. Recommender systems is a necessity to decide which of …
Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems
P Amthor, D Fischer, WE Kühnhauser… - Proceedings of the 14th …, 2019 - dl.acm.org
Cyber security management requires fast and cost efficient responses to threat alerts.
Automation of cyber threat sensing and responding is one way to achieve immediate …
Automation of cyber threat sensing and responding is one way to achieve immediate …
Intelligent analysis of android application privacy policy and permission consistency
With the continuous development of mobile devices, mobile applications bring a lot of
convenience to people's lives. The abuse of mobile device permissions is prone to the risk of …
convenience to people's lives. The abuse of mobile device permissions is prone to the risk of …
[PDF][PDF] Permission-based android malware detection using machine learning
S Seraj - 2023 - research.brighton.ac.uk
Mobile devices, particularly Android-based devices, have become essential to our daily
lives. However, this trend has also increased the number and sophistication of mobile …
lives. However, this trend has also increased the number and sophistication of mobile …
Recommender systems: The Importance of personalization in E-business environments
Due to the rapid growth of the internet in conjunction with the information overload problem
the use of recommender systems has started to become necessary for both e-businesses …
the use of recommender systems has started to become necessary for both e-businesses …
SpyAware: Investigating the privacy leakage signatures in app execution traces
A new security problem on smartphones is the wide spread of spyware nested in apps,
which occasionally and silently collects user's private data in the background. The state-of …
which occasionally and silently collects user's private data in the background. The state-of …
PhoneProtector: protecting user privacy on the android-based mobile platform
With the popularity of Android platform based mobile phones, privacy protection of Android
platform becomes a focus area. Now protection for Android based smart phone has many …
platform becomes a focus area. Now protection for Android based smart phone has many …
[PDF][PDF] Remote Android Access via SMS
TB MAHADULE, DC ROMESHWARI, VK VARSHA… - 2020 - irejournals.com
In this paper an idea to access the remote mobile base on android operating system via a
single sms which can send from any anonymous mobile round the world is presented. The …
single sms which can send from any anonymous mobile round the world is presented. The …
Towards access control model engineering
WE Kühnhauser, A Pölck - … , ICISS 2011, Kolkata, India, December 15-19 …, 2011 - Springer
Formal security models have significantly improved the understanding of access control
systems. They have influenced the way access control policies are specified and analyzed …
systems. They have influenced the way access control policies are specified and analyzed …