Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
Privacy issues of android application permissions: A literature review
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …
software framework, and core programs. This platform uses permissions to hide precious …
A review of detecting malware in android devices based on machine learning techniques
M Sharma, A Kaul - Expert Systems, 2024 - Wiley Online Library
Malware developers install malware on mobile users' devices and steal their personal
information without their knowledge. According to recent studies, it has been observed that …
information without their knowledge. According to recent studies, it has been observed that …
[PDF][PDF] The effects of training using an android-based media blocker tool on the West Sumatra pelatprov sepaktakraw smash in 2023
The problem in this study was the low achievement of sepaktakraw athletes who were
thought to be influenced by a smash often failing to turn off the ball. The ball was often …
thought to be influenced by a smash often failing to turn off the ball. The ball was often …
ARANAC: a bring-your-own-permissions network access control methodology for android devices
In this paper, we introduce a new methodology for network access control for Android
devices based on app risk assessment. Named ARANAC (which stands for Application Risk …
devices based on app risk assessment. Named ARANAC (which stands for Application Risk …
A systematic review of bring your own device (BYOD) authentication technique
F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …
technique. The review main goal is to identify the existing BYOD authentication technique …
[HTML][HTML] EHKP-Res: An explainable dynamic security solution for medical healthcare
X Chen, J Cai, W **ao, Y Huo, J Wang… - Digital Communications …, 2024 - Elsevier
An increasing number of medical institutions and patients are adopting the practice of
storing their data on medical cloud servers, which greatly facilitates the sharing of medical …
storing their data on medical cloud servers, which greatly facilitates the sharing of medical …
Permissions plugins as android apps
The permissions framework for Android is frustratingly inflexible. Once granted a permission,
Android will always allow an app to access the resource until the user manually revokes the …
Android will always allow an app to access the resource until the user manually revokes the …
[KNYGA][B] Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT
W Tounsi - 2019 - books.google.com
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber
criminals are infiltrating companies in a variety of sectors. In today's landscape …
criminals are infiltrating companies in a variety of sectors. In today's landscape …
[PDF][PDF] Android Application Permission Model
ZR Alkindi, SQ Unviresity, O Muscat… - Proceedings of the …, 2019 - researchgate.net
Smart devices have been developed to dominate the market as a communication channel
that supports various online services for a wide range of end users. Android architecture …
that supports various online services for a wide range of end users. Android architecture …