Suggested Topics within your search.
Suggested Topics within your search.
Mobile security
7
Android (operating system)
4
Malware
4
Machine learning
3
Malware detection
3
Android
2
BYOD
2
Cybersecurity
2
Mobile telecommunication systems
2
Open systems
2
Static analysis
2
android
2
Adversarial evasion attack
1
Adversarial evasion attacks
1
Android malware
1
Android ransomware
1
Android systems
1
Attack mitigation
1
Authentication
1
Authorized users
1
Botnet Detection
1
Botnet detection
1
Botnet detections
1
Botnets
1
COMMAND
1
Classification (of information)
1
Command and control
1
Complex networks
1
Cyber security
1
Daily activity
1
-
121“... for computer network management and mobile security issues. Symantec Corporation’s experts argue that hacker...”
Get full text
Others -
122“... including mobile security. Android system is an open source, hence it allows the apps which...”
Get full text
Others -
123“...Mobile security is an important issue on Android platform. Most malware detection methods based...”
Get full text
Article -
124by Neverdauskaitė, Vaida“... application security requirements. Enterprise mobile security should ensure two key components: enterprise...”
Published 2013
Get full text
Dissertation -
125“... community. But it requires a very low-cost mobile security transaction mechanism to purchase a variety...”
Get full text
Others -
126by Till, Sarina“..., digital natives do not understand mobile security and privacy features and therefore ignore them. Digital...”
Published 2020
Get full text
Dissertation -
127by Yazicioglu, Ahmet Yasin“... of networks by some mobile security resources. As such, the proposed scheme drives a group of arbitrarily...”
Published 2015
Get full text
Others -
128“... presents a mechanism for providing long-term care through a body sensor network (BSN) to ensure the mobile...”
Get full text
Others -
129by Shambra, Stephen M.“... solution is developed and introduced in this thesis that can aid in combating potential threats to mobile...”
Published 2017
Get full text
Others -
130“... of the mobile security solutions, is a process of verifying the identity and integrity status of the remote...”
Get full text
Article -
131“..., and mobile security care. Data were collected through in-depth interviews with the managers or principal...”
Get full text
Article -
132
-
133by Ting-Wey Yang, 楊庭維“... system. Mobile Security Monitoring System that is able to achieve so that the guardian at any time...”
Get full text
Others -
134by Wällstedt, Viktor“... Security Project (OWASP) Mobile Security Testing Guide (MSTG) framework can be adapted and used...”
Published 2019
Get full text
Others -
135by Maulick, David E“... hope to develop a clear landscape of overall mobile security mechanism usability, but we also hope...”
Published 2018
Get full text
Get full text
Others -
136“... within mobile. An ideal mobile security solution would be one that is compatible with all the major...”
Get full text
Others -
137by Jaroslav Jevčák, Miroslav Kelemen, Matej Antoško, Ladislav Choma, Jaroslaw Kozuba“..., the fight against illegal migration, smuggling of goods, etc. are also interested in mobile security...”
Published 2020-09-01
Get full text
Article -
138“... process. Our experimental results give some practical and useful guidelines to mobile security researchers...”
Get full text
Others -
139“... mobile security police work, not play into the effectiveness of manpower with draftees, only in respect...”
Get full text
Others -
140“... entity card and payment card important information stored on mobile security element. Since the mobile...”
Get full text
Others