Comprehensive review and analysis of anti-malware apps for smartphones

M Talal, AA Zaidan, BB Zaidan, OS Albahri… - Telecommunication …, 2019 - Springer
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …

Privacy issues of android application permissions: A literature review

G Shrivastava, P Kumar, D Gupta… - Transactions on …, 2020 - Wiley Online Library
Android is an application platform for mobile devices. It comprises of the operating system,
software framework, and core programs. This platform uses permissions to hide precious …

A review of detecting malware in android devices based on machine learning techniques

M Sharma, A Kaul - Expert Systems, 2024 - Wiley Online Library
Malware developers install malware on mobile users' devices and steal their personal
information without their knowledge. According to recent studies, it has been observed that …

[PDF][PDF] The effects of training using an android-based media blocker tool on the West Sumatra pelatprov sepaktakraw smash in 2023

J Arwandi, S Bais, F Zarya, J Haryanto, T Insani… - Journal of Physical …, 2023 - efsupit.ro
The problem in this study was the low achievement of sepaktakraw athletes who were
thought to be influenced by a smash often failing to turn off the ball. The ball was often …

ARANAC: a bring-your-own-permissions network access control methodology for android devices

JA Gómez-Hernández, J Camacho… - IEEE …, 2021 - ieeexplore.ieee.org
In this paper, we introduce a new methodology for network access control for Android
devices based on app risk assessment. Named ARANAC (which stands for Application Risk …

A systematic review of bring your own device (BYOD) authentication technique

F Jamal, M Taufik, AA Abdullah… - Journal of Physics …, 2020 - iopscience.iop.org
This article provides a systematic review of Bring Your Own Device (BYOD) authentication
technique. The review main goal is to identify the existing BYOD authentication technique …

[HTML][HTML] EHKP-Res: An explainable dynamic security solution for medical healthcare

X Chen, J Cai, W **ao, Y Huo, J Wang… - Digital Communications …, 2024 - Elsevier
An increasing number of medical institutions and patients are adopting the practice of
storing their data on medical cloud servers, which greatly facilitates the sharing of medical …

Permissions plugins as android apps

N Raval, A Razeen, A Machanavajjhala… - Proceedings of the 17th …, 2019 - dl.acm.org
The permissions framework for Android is frustratingly inflexible. Once granted a permission,
Android will always allow an app to access the resource until the user manually revokes the …

[KNYGA][B] Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT

W Tounsi - 2019 - books.google.com
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber
criminals are infiltrating companies in a variety of sectors. In today's landscape …

[PDF][PDF] Android Application Permission Model

ZR Alkindi, SQ Unviresity, O Muscat… - Proceedings of the …, 2019 - researchgate.net
Smart devices have been developed to dominate the market as a communication channel
that supports various online services for a wide range of end users. Android architecture …