Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Steganography in modern smartphones and mitigation techniques
By offering sophisticated services and centralizing a huge volume of personal data, modern
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
smartphones changed the way we socialize, entertain and work. To this aim, they rely upon …
“Andromaly”: a behavioral malware detection framework for android devices
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …
devices. The proposed framework realizes a Host-based Malware Detection System that …
Detecting Android malware using long short-term memory (LSTM)
Abstract Long Short-term Memory (LSTM) is a sub set of recurrent neural network (RNN)
which is specifically used to train to learn long-term temporal dynamics with sequences of …
which is specifically used to train to learn long-term temporal dynamics with sequences of …
Automated static code analysis for classifying android applications using machine learning
In this paper we apply Machine Learning (ML) techniques on static features that are
extracted from Android's application files for the classification of the files. Features are …
extracted from Android's application files for the classification of the files. Features are …
The influence of information overload on the development of trust and purchase intention based on online product reviews in a mobile vs. web environment: an …
Abstract Information overload has been studied extensively by decision science
researchers, particularly in the context of task-based optimization decisions. Media selection …
researchers, particularly in the context of task-based optimization decisions. Media selection …
On the need for different security methods on mobile phones
Mobile phones are rapidly becoming small-size general purpose computers, so-called
smartphones. However, applications and data stored on mobile phones are less protected …
smartphones. However, applications and data stored on mobile phones are less protected …
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention
The explosive global adoption of mobile applications (ie, apps) has been fraught with
security and privacy issues. App users typically have a poor understanding of information …
security and privacy issues. App users typically have a poor understanding of information …
Deep android malware detection and classification
Long short-term memory recurrent neural network (LSTM-RNN) have witnessed as a
powerful approach for capturing long-range temporal dependencies in sequences of …
powerful approach for capturing long-range temporal dependencies in sequences of …
Smartphone information security awareness: A victim of operational pressures
Smartphone information security awareness describes the knowledge, attitude and
behaviour that employees apply to the security of the organisational information that they …
behaviour that employees apply to the security of the organisational information that they …