Showing 1 - 20 results of 198 for search '"mobile security"', query time: 1.13s Refine Results
  1. 1
  2. 2
    by LaFrenier, Kevin J.
    Published 2012
    ... transceiver stations or base station controllers. This work defines mobile security enclaves, which...
    Get full text
  3. 3
  4. 4
    by Alla Levina, Pavel Borisenko, Roman Mostovoy
    Published 2017-04-01
    Subjects: ...Mobile security...
    Get full text
    Article
  5. 5
  6. 6
    by Rezaie, Siavash
    Published 2018
    ... and implements five labs for a potential undergraduate mobile security course with a focus on the Android...
    Get full text
    Get full text
    Others
  7. 7
    by Paweł Weichbroth, Łukasz Łysik
    Published 2020-01-01
    ...Communicating mobile security threats and best practices has become a central objective due...
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
    by Brand, Johanna Catherina
    Published 2013
    ... enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks...
    Get full text
    Others
  13. 13
    by WU,SHENG-CHENG, 吳聲政
    Published 2017
    ... the factors that influence intention to use mobile security APPs. This study collects sample data from a web...
    Get full text
    Others
  14. 14
    by Chiung-Yi Liu, 劉炯毅
    Published 2010
    ... gate mobile security system. Thus, the user can validate his/her identification immedidtely...
    Get full text
    Others
  15. 15
    by Yung-shang Yang, 楊永祥
    Published 2007
    ... their requirements. Therefore, this research proposes an intelligent building based on mobile security and home...
    Get full text
    Others
  16. 16
  17. 17
    by Shu-Ming Liu, 劉書銘
    Published 2019
    ... the participants use the mobile securities APPs. The research results revealed that: (1) The participants’ time...
    Get full text
    Others
  18. 18
    by Long-Yeu Chung
    Published 2013-01-01
    ...We propose a wireless remote teleoperated and autonomous mobile security robot based on a...
    Get full text
    Article
  19. 19
    by Shen Shen Hung, 沈伸鴻
    Published 2002
    ... system (RSCS) includes remote mobile security system (RMSS) and PC based security system (PCSS). The MSSR...
    Get full text
    Others
  20. 20
    by Bhoola, Nisha.
    Published 2013
    ... towards mobile security guidelines. The research was conducted across thirteen schools in the Pinetown...
    Get full text