Suggested Topics within your search.
Suggested Topics within your search.
Mobile security
7
Android (operating system)
4
Malware
4
Machine learning
3
Malware detection
3
Android
2
BYOD
2
Cybersecurity
2
Mobile telecommunication systems
2
Open systems
2
Static analysis
2
android
2
Adversarial evasion attack
1
Adversarial evasion attacks
1
Android malware
1
Android ransomware
1
Android systems
1
Attack mitigation
1
Authentication
1
Authorized users
1
Botnet Detection
1
Botnet detection
1
Botnet detections
1
Botnets
1
COMMAND
1
Classification (of information)
1
Command and control
1
Complex networks
1
Cyber security
1
Daily activity
1
-
1
-
2by LaFrenier, Kevin J.“... transceiver stations or base station controllers. This work defines mobile security enclaves, which...”
Published 2012
Get full text
-
3
-
4
-
5
-
6by Rezaie, Siavash“... and implements five labs for a potential undergraduate mobile security course with a focus on the Android...”
Published 2018
Get full text
Get full text
Others -
7“...Communicating mobile security threats and best practices has become a central objective due...”
Get full text
Article -
8
-
9
-
10
-
11
-
12by Brand, Johanna Catherina“... enterprise mobility security risks to ensure an effective process to mitigate the impact of these risks...”
Published 2013
Get full text
Others -
13“... the factors that influence intention to use mobile security APPs. This study collects sample data from a web...”
Get full text
Others -
14“... gate mobile security system. Thus, the user can validate his/her identification immedidtely...”
Get full text
Others -
15“... their requirements. Therefore, this research proposes an intelligent building based on mobile security and home...”
Get full text
Others -
16
-
17“... the participants use the mobile securities APPs. The research results revealed that: (1) The participants’ time...”
Get full text
Others -
18by Long-Yeu Chung“...We propose a wireless remote teleoperated and autonomous mobile security robot based on a...”
Published 2013-01-01
Get full text
Article -
19“... system (RSCS) includes remote mobile security system (RMSS) and PC based security system (PCSS). The MSSR...”
Get full text
Others -
20by Bhoola, Nisha.“... towards mobile security guidelines. The research was conducted across thirteen schools in the Pinetown...”
Published 2013
Get full text