Showing 121 - 140 results of 198 for search '"mobile security"', query time: 1.55s Refine Results
  1. 121
    by Tai-Yuan Chiou, 邱泰源
    Published 2011
    ... for computer network management and mobile security issues. Symantec Corporation’s experts argue that hacker...
    Get full text
    Others
  2. 122
    by TAN, GENG-LUN, 譚庚倫
    Published 2017
    ... including mobile security. Android system is an open source, hence it allows the apps which...
    Get full text
    Others
  3. 123
    by Jinpei Yan, Yong Qi, Qifan Rao
    Published 2018-01-01
    ...Mobile security is an important issue on Android platform. Most malware detection methods based...
    Get full text
    Article
  4. 124
    by Neverdauskaitė, Vaida
    Published 2013
    ... application security requirements. Enterprise mobile security should ensure two key components: enterprise...
    Get full text
    Dissertation
  5. 125
    by Guang-Li Fu, 傅光莉
    Published 2007
    ... community. But it requires a very low-cost mobile security transaction mechanism to purchase a variety...
    Get full text
    Others
  6. 126
    by Till, Sarina
    Published 2020
    ..., digital natives do not understand mobile security and privacy features and therefore ignore them. Digital...
    Get full text
    Dissertation
  7. 127
    by Yazicioglu, Ahmet Yasin
    Published 2015
    ... of networks by some mobile security resources. As such, the proposed scheme drives a group of arbitrarily...
    Get full text
    Others
  8. 128
    by Chyun-ChyiChen, 陳群奇
    Published 2015
    ... presents a mechanism for providing long-term care through a body sensor network (BSN) to ensure the mobile...
    Get full text
    Others
  9. 129
    by Shambra, Stephen M.
    Published 2017
    ... solution is developed and introduced in this thesis that can aid in combating potential threats to mobile...
    Get full text
    Others
  10. 130
    by Ziwang Wang, Yi Zhuang, Zujia Yan
    Published 2020-01-01
    ... of the mobile security solutions, is a process of verifying the identity and integrity status of the remote...
    Get full text
    Article
  11. 131
    by Tung-Cheng Lin, Hong-Jer Chang, Chung-Chien Huang
    Published 2011-12-01
    ..., and mobile security care. Data were collected through in-depth interviews with the managers or principal...
    Get full text
    Article
  12. 132
  13. 133
    ... system. Mobile Security Monitoring System that is able to achieve so that the guardian at any time...
    Get full text
    Others
  14. 134
    by Wällstedt, Viktor
    Published 2019
    ... Security Project (OWASP) Mobile Security Testing Guide (MSTG) framework can be adapted and used...
    Get full text
    Others
  15. 135
    by Maulick, David E
    Published 2018
    ... hope to develop a clear landscape of overall mobile security mechanism usability, but we also hope...
    Get full text
    Get full text
    Others
  16. 136
    by Moradinia, Pourya, Haule, Godfrey
    Published 2012
    ... within mobile.   An ideal mobile security solution would be one that is compatible with all the major...
    Get full text
    Others
  17. 137
    ..., the fight against illegal migration, smuggling of goods, etc. are also interested in mobile security...
    Get full text
    Article
  18. 138
    by Chih-Chieh Yang, 楊智傑
    Published 2010
    ... process. Our experimental results give some practical and useful guidelines to mobile security researchers...
    Get full text
    Others
  19. 139
    by Ping-Chen Chen, 陳炳臣
    Published 2010
    ... mobile security police work, not play into the effectiveness of manpower with draftees, only in respect...
    Get full text
    Others
  20. 140
    by Wei-hsien Lee, 李威賢
    Published 2015
    ... entity card and payment card important information stored on mobile security element. Since the mobile...
    Get full text
    Others