[HTML][HTML] Unmasking privacy apprehension: A bibliometric review of mobile sharing economy applications

TDT Pham, FY Lo, KH Huarng - Journal of Innovation & Knowledge, 2025 - Elsevier
The emergence of mobile applications (apps) that utilize sharing economy concepts has
revolutionized multiple industries, including transportation, accommodation, healthcare, and …

Mobile recommender systems: An overview of technologies and challenges

N Polatidis, CK Georgiadis - 2013 Second International …, 2013 - ieeexplore.ieee.org
The use of mobile devices in combination with the rapid growth of the internet has generated
an information overload problem. Recommender systems is a necessity to decide which of …

Automated cyber threat sensing and responding: integrating threat intelligence into security-policy-controlled systems

P Amthor, D Fischer, WE Kühnhauser… - Proceedings of the 14th …, 2019 - dl.acm.org
Cyber security management requires fast and cost efficient responses to threat alerts.
Automation of cyber threat sensing and responding is one way to achieve immediate …

Intelligent analysis of android application privacy policy and permission consistency

T Tu, H Zhang, B Gong, D Du, Q Wen - Artificial Intelligence Review, 2024 - Springer
With the continuous development of mobile devices, mobile applications bring a lot of
convenience to people's lives. The abuse of mobile device permissions is prone to the risk of …

[PDF][PDF] Permission-based android malware detection using machine learning

S Seraj - 2023 - research.brighton.ac.uk
Mobile devices, particularly Android-based devices, have become essential to our daily
lives. However, this trend has also increased the number and sophistication of mobile …

Recommender systems: The Importance of personalization in E-business environments

N Polatidis, CK Georgiadis - International Journal of E …, 2013 - igi-global.com
Due to the rapid growth of the internet in conjunction with the information overload problem
the use of recommender systems has started to become necessary for both e-businesses …

SpyAware: Investigating the privacy leakage signatures in app execution traces

H Xu, Y Zhou, C Gao, Y Kang… - 2015 IEEE 26th …, 2015 - ieeexplore.ieee.org
A new security problem on smartphones is the wide spread of spyware nested in apps,
which occasionally and silently collects user's private data in the background. The state-of …

PhoneProtector: protecting user privacy on the android-based mobile platform

W Zhang, H He, Q Zhang, T Kim - International Journal of …, 2014 - journals.sagepub.com
With the popularity of Android platform based mobile phones, privacy protection of Android
platform becomes a focus area. Now protection for Android based smart phone has many …

[PDF][PDF] Remote Android Access via SMS

TB MAHADULE, DC ROMESHWARI, VK VARSHA… - 2020 - irejournals.com
In this paper an idea to access the remote mobile base on android operating system via a
single sms which can send from any anonymous mobile round the world is presented. The …

Towards access control model engineering

WE Kühnhauser, A Pölck - … , ICISS 2011, Kolkata, India, December 15-19 …, 2011 - Springer
Formal security models have significantly improved the understanding of access control
systems. They have influenced the way access control policies are specified and analyzed …