Academic literature on the topic 'APP PERMISSION'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'APP PERMISSION.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "APP PERMISSION"

1

Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (2019): 3699. http://dx.doi.org/10.3390/app9183699.

Full text
Abstract:
Permission-related issues in Android apps have been widely studied in our research community, while most of the previous studies considered these issues from the perspective of app users. In this paper, we take a different angle to revisit the permission-related issues from the perspective of app developers. First, we perform an empirical study on investigating how we can help developers make better decisions on permission uses during app development. With detailed experimental results, we show that many permission-related issues can be identified and fixed during the application development p
APA, Harvard, Vancouver, ISO, and other styles
2

Ullah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (2022): 246. http://dx.doi.org/10.3390/electronics11020246.

Full text
Abstract:
Recently, smartphone usage has increased tremendously, and smartphones are being used as a requirement of daily life, equally by all age groups. Smartphone operating systems such as Android and iOS have made it possible for anyone with development skills to create apps for smartphones. This has enabled smartphone users to download and install applications from stores such as Google Play, App Store, and several other third-party sites. During installation, these applications request resource access permissions from users. The resources include hardware and software like contact, memory, locatio
APA, Harvard, Vancouver, ISO, and other styles
3

Naga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.

Full text
Abstract:
Mobile phone have user’s personal and private information. When mobile applications have the permission to access to this information they may leak it to third parties without user’s consent for their own benefits. As users are not aware of how their personal information would be used once applications are installed and permissions are granted, this raises a potential privacy concern. Therefore, there is a need for a risk assessment model that can intimate the users about the threats the mobile application poses to the user's private information. We propose an approach that helps in increasing
APA, Harvard, Vancouver, ISO, and other styles
4

Onik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (2019): 3997. http://dx.doi.org/10.3390/app9193997.

Full text
Abstract:
Android is offering millions of apps on Google Play-store by the application publishers. However, those publishers do have a parent organization and share information with them. Through the ‘Android permission system’, a user permits an app to access sensitive personal data. Large-scale personal data integration can reveal user identity, enabling new insights and earn revenue for the organizations. Similarly, aggregation of Android app permissions by the app owning parent organizations can also cause privacy leakage by revealing the user profile. This work classifies risky personal data by pro
APA, Harvard, Vancouver, ISO, and other styles
5

Karri, Praveen Kumar, D. Jaya Kumari, and Sowmya Sree Karri. "A Scalable Malware Detection Approach through Significant Permission Identification for Android Devices." International Journal of Innovation in Multidisciplinary Scientific Research 02, no. 01 (2024): 24–29. http://dx.doi.org/10.61239/ijimsr.2024.2113.

Full text
Abstract:
The global ubiquity of smartphones has led to the availability of many free apps for gaming, communication, financial, and educational needs. However, hazardous malicious software targeting smartphones has increased as the global adoption of these devices has grown. Malware is growing rapidly, with reports predicting a new Android app every 10 seconds, threatening the mobile ecosystem. Due to Android's versatility, users can install apps from third-party app shops and file-sharing websites, compounding malware outbreaks. The seriousness of this situation requires scalable malware detection. Ba
APA, Harvard, Vancouver, ISO, and other styles
6

Paul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.

Full text
Abstract:
Frequency of malware attacks because Android apps are increasing day by day. Current studies have revealed startling facts about data harvesting incidents, where user’s personal data is at stake. To preserve privacy of users, a permission induced risk interface MalApp to identify privacy violations rising from granting permissions during app installation is proposed. It comprises of multi-fold process that performs static analysis based on app’s category. First, concept of reverse engineering is applied to extract app permissions to construct a Boolean-valued permission matrix. Second, ranking
APA, Harvard, Vancouver, ISO, and other styles
7

Xiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 797. http://dx.doi.org/10.1177/1541931213601692.

Full text
Abstract:
Previous studies have shown that inclusion of a permission safety score/cue in the early stage of selecting an app assists users in making safer choices (Chen, Gates, Li, & Proctor, 2015; Gates, Chen, Li, & Proctor, 2014; Rajivan & Camp, 2016). Yet, user ratings were typically weighted more in app-selection decisions than a summary permission safety score, suggesting that app-associated risks are not fully understood or known by users. In daily interactions, people make privacy decisions not just based on rational considerations but also on heuristics (e.g., take the first, Dogruel
APA, Harvard, Vancouver, ISO, and other styles
8

Naderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.

Full text
Abstract:
Introduction: In this study, Persian Android mobile health (mhealth) applications were studied to describe usage of dangerous permissions in health related mobile applications. So the most frequently normal and dangerous permissions used in mhealth applications were reviewed.Materials and Methods: We wrote a PHP script to crawl information of Android apps in “health” and “medicine” categories from Cafebazaar app store. Then permission information of these application were extracted.Results: 11627 permissions from 3331 studied apps were obtained. There was at least one dangerous permission in 4
APA, Harvard, Vancouver, ISO, and other styles
9

Reimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "APP PERMISSION"

1

Kulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rustgi, Pulkit. "The Evaluation of an Android Permission Management System Based on Crowdsourcing." VCU Scholars Compass, 2019. https://scholarscompass.vcu.edu/etd/6033.

Full text
Abstract:
Mobile and web application security, particularly concerning the area of data privacy, has received much attention from the public in recent years. Most applications are installed without disclosing full information to users and clearly stating what they have access to. This often raises concerns when users become aware of unnecessary information being collected or stored. Unfortunately, most users have little to no technical knowledge in regard to what permissions should be granted and can only rely on their intuition and past experiences to make relatively uninformed decisions. DroidNet, a c
APA, Harvard, Vancouver, ISO, and other styles
3

Lu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Almuhimedi, Hazim. "Helping Smartphone Users Manage their Privacy through Nudges." Research Showcase @ CMU, 2017. http://repository.cmu.edu/dissertations/1103.

Full text
Abstract:
The two major smartphone platforms (Android and iOS) have more than two mil- lion mobile applications (apps) available from their respective app stores, and each store has seen more than 50 billion apps downloaded. Although apps provide desired functionality by accessing users’ personal information, they also access personal information for other purposes (e.g., advertising or profiling) that users may or may not desire. Users can exercise control over how apps access their personal information through permission managers. However, a permission manager alone might not be sufficient to help use
APA, Harvard, Vancouver, ISO, and other styles
5

Dahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.

Full text
Abstract:
The Android OS is ever growing on the global market, reaching more and more people. This have led to the distribution of millions of applications, that the Android user can interact with. However, the usage of Android apps is not risk free and there are various methods deployed by Google Play to protect the privacy of the Android owner. One of these protective measures are permissions. However, as permissions are controlled by the user, there is a need of comprehending the user behaviour and attitude to the permissions. Lack of understanding the importance, and of the permission itself, could
APA, Harvard, Vancouver, ISO, and other styles
6

Su, Shu-Miaw. "English planning permission and Taiwanese development permission : the relevant measures of planning permission - a lesson from English experience." Thesis, University College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sagar, Shraddha. "PREDICTION OF PROTECTED-PERMISSIVE LEFT-TURN PHASING CRASHES BASED ON CONFLICT ANALYSIS." UKnowledge, 2017. https://uknowledge.uky.edu/ce_etds/60.

Full text
Abstract:
Left-turning maneuvers are considered to be the highest risk movements at intersections and two-thirds of the crashes associated with left-turns are reported at signalized intersections. Left-turning vehicles typically encounter conflicts from opposing through traffic. To separate conflicting movements, transportation agencies use a protected-only phase at signalized intersections where each movement is allowed to move alone. However, this could create delays and thus the concept of a protected-permissive phase has been introduced to balance safety and delays. However, the permissive part of t
APA, Harvard, Vancouver, ISO, and other styles
8

Jamil, Eva, and Mazdak Shirazi. "Spelar behörighetskrav någon roll? : En kvantitativ studie av Android användares beteende och förståelse." Thesis, Högskolan i Borås, Akademin för bibliotek, information, pedagogik och IT, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-12225.

Full text
Abstract:
Problem - Android är det ledande operativsystemet på marknaden, samtidigt har tidigare forskning påvisat att skadlig kod och mobila attacker främst har riktats mot Androidenheter. Attacker utförs genom att applikationer som innehar skadlig kod, får den åtkomst på enheten som de begär genom att applikationsbehörigheter godkänns av användaren före installation av en applikation. Ett stort problem är att användarna i dagsläget väljer att ignorera behörigheterna före installation samt inte förstår dess betydelse. Frågeställning och syfte - Studien syftar till att undersöka tre frågeställningar. De
APA, Harvard, Vancouver, ISO, and other styles
9

RAWAL, PRAVEEN SINGH. "APP PERMISSION CLASSIFICATION : STATIC AND DYNAMIC METHODS." Thesis, 2023. http://dspace.dtu.ac.in:8080/jspui/handle/repository/20424.

Full text
Abstract:
It is no secret that Android is one of the most widely used smartphone operating systems globally, boasting a staggering 2.5 billion active users. However, data secu¬rity has become a crucial aspect of smartphone usage with the increasing reliance on smartphones to store sensitive personal information. Unfortunately, many apps tend to collect user data without the user's knowledge or consent, which can harm data security. To counter this, Android has included an inbuilt security feature called app permission to enable users to control app access. This feature enables users to grant or decline
APA, Harvard, Vancouver, ISO, and other styles
10

Wu, Min-Xun, and 吳旻訓. "Understanding the Impacts of Permission Requested on Mobile App Adoption." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/ykzfa4.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊管理學系研究所<br>102<br>Because of the expanding of smartphones, the applications on smartphones, Apps, are widely discussed. In Android platform, Apps have to acquire permissions in order to provide various functions for users. However, Apps might request more permissions than they need. Users have to grant permissions requested by Apps before downloading Apps. The purpose of this study is understanding the impacts of permissions on users&apos;&apos; intention to download mobile Apps. We proposed the concept of &;quot;permission-function fit (PFF)&;quot;, and included perceived pr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "APP PERMISSION"

1

Sayles, Victoria. 11. Licences and proprietary estoppel. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198815198.003.0011.

Full text
Abstract:
Each Concentrate revision guide is packed with essential information, key cases, revision tips, exam Q&amp;As, and more. Concentrates show you what to expect in a law exam, what examiners are looking for, and how to achieve extra marks. This chapter discusses licences. A licence is permission given by the licensor to the licensee to allow the latter to enter the land of the former, which, without such permission would otherwise amount to a trespass. Different types of licences have different rules in relation to the original parties and successors in title. A bare licence is revocable by the l
APA, Harvard, Vancouver, ISO, and other styles
2

Polivach, A., and P. Gudev. Polivach A.P., Gudev P.A. The IMEMO Sea Powers’ Rankings 2021 (2.0). – Moscow, IMEMO, 2021. – 178 p. Primakov National Research Institute of World Economy and International Relations, Russian Academy of Sciences (IMEMO), 23, Profsoyuznaya Str., Moscow, 117997, Russian Federation, 2021. http://dx.doi.org/10.20542/978-5-9535-0601-4.

Full text
Abstract:
This book describes the system of indexes, developed by the IMEMO for evaluation of the overall maritime potential of a country. The Index of Maritime Might (IMM) is atop this system. This research includes the rankings of the top-100 countries according to their involvement in the maritime domain. The countries are compared by their ability to conduct a variety of maritime activities, either military or economical, which were calculated on the basis of statistical data as of the 1st of January 2021. This edition contains an updated version (2.0) of the indexes. All rights reserved. No part of
APA, Harvard, Vancouver, ISO, and other styles
3

Manson, Leigh, and Shona Muir. Advance care planning in New Zealand: our Voice—tō tātou reo. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198802136.003.0021.

Full text
Abstract:
Advance care planning (ACP) in New Zealand has grown as a people’s movement resourced by passionate individuals across the country. This people’s movement is a whole of systems approach led by the national ACP Cooperative. The approach has provided a permissive platform for the national evolution of ACP and has allowed ACP to quickly gain momentum. It has facilitated the collaboration of multiple interest groups with consumers at the centre and has provided an environment for innovation. The ACP Cooperative used a deployment model to drive the work. The model insured that the movement focused
APA, Harvard, Vancouver, ISO, and other styles
4

Stephens, Keri K. Mobile Workers in a Hospital. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190625504.003.0009.

Full text
Abstract:
Hospitals are busy places, and healthcare professionals are literally always on the move. These mobile workers have challenging communication needs because they shift from being with patients and collaborating with peers to dictating and entering patient data into electronic healthcare records. As if being mobile and having many communication partners weren’t enough, these workers also have to worry about patient privacy and their high-stakes decisions. This chapter features a study of a hospital implementing a permissive BYOD policy and a mobile text-messaging app. It’s hard to develop trust
APA, Harvard, Vancouver, ISO, and other styles
5

Aditi, Paul. Current Collegiate Hookup Culture. The Rowman & Littlefield Publishing Group, 2022. https://doi.org/10.5040/9781978727335.

Full text
Abstract:
The Current Collegiate Hookup Culture provides a holistic picture of the current hookup culture in American college campuses. Based on the findings from a nationally representative survey, Aditi Paul demonstrates that hookups initiated through dating apps are fundamentally different from hookups that ensue from conventional meeting contexts. By comparing the socio-demographic and psychological profiles of students who report meeting their hookup partners through dating apps compared to other venues, she examines if and how hookup scripts and the physical and emotional outcomes of hookups diffe
APA, Harvard, Vancouver, ISO, and other styles
6

Clarke, Sandra, and Sarah Greer. Land Law Directions. Oxford University Press, 2018. http://dx.doi.org/10.1093/he/9780198809555.001.0001.

Full text
Abstract:
Land Law Directions provides engaging and straightforward explanations of difficult concepts. Case summaries, photographs, and examples are used throughout to provide real-life context and to clarify abstract ideas, while diagrams and definitions ensure the text is easy to follow and that key points are understood. The book provides a full range of resources designed to help build upon and further existing understanding, including thinking points, end of chapter questions, and tips on linking topics together. A final chapter pulls together key details from each chapter, showing how topics link
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "APP PERMISSION"

1

Mathur, Akshay, Ethan Ewoldt, Quamar Niyaz, Ahmad Javaid, and Xiaoli Yang. "Permission-Educator: App for Educating Users About Android Permissions." In Intelligent Human Computer Interaction. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-98404-5_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shen, Yidong, Ming Xu, Ning Zheng, et al. "Android App Classification and Permission Usage Risk Assessment." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00916-8_52.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mohanty, Jaikishan, and Divyashikha Sethia. "Android App Permission Detector Based on Machine Learning Models." In Communications in Computer and Information Science. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-80839-5_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Raber, Frederic, and Antonio Krueger. "Towards Understanding the Influence of Personality on Mobile App Permission Settings." In Human-Computer Interaction – INTERACT 2017. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-68059-0_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Huang, Keman, Jinjing Han, Shizhan Chen, and Zhiyong Feng. "A Skewness-Based Framework for Mobile App Permission Recommendation and Risk Evaluation." In Service-Oriented Computing. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-46295-0_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Huang, Hsiao-Ying, and Masooda Bashir. "Android App Permission and Users’ Adoption: A Case Study of Mental Health Application." In Human Aspects of Information Security, Privacy and Trust. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-58460-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lavranou, Rena, and Aggeliki Tsohou. "Unlocking User Privacy: A Systematic Survey of Factors and Methods in Predicting App Permission Decisions." In IFIP Advances in Information and Communication Technology. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-63215-0_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

MacDuffie, Jason K., and Patricia A. Morreale. "Comparing Android App Permissions." In Design, User Experience, and Usability: Technological Contexts. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40406-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Schwarz, Torsten. "Grundlagen des Permission Marketing." In Das Handbuch Direct Marketing & More. Gabler Verlag, 2002. http://dx.doi.org/10.1007/978-3-322-90220-7_55.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bierhoff, Kevin, Nels E. Beckman, and Jonathan Aldrich. "Practical API Protocol Checking with Access Permissions." In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-03013-0_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "APP PERMISSION"

1

Flores, Alexis Morales, Michael He, William Wu, and Imani N. S. Munyaka. "A License to Prey: Investigating the Impact of Digital Loan App Regulations on Permission Requests and Privacy Policies in the Kenyan Market." In 2024 IEEE International Symposium on Technology and Society (ISTAS). IEEE, 2024. http://dx.doi.org/10.1109/istas61960.2024.10732051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nauman, Mohammad, and Sohail Khan. "Ensuring Sustainable Safety in Fine-Grained Android Permission Model: Decidability through Finite Attribute Range Constraints." In 2025 22nd International Learning and Technology Conference (L&T). IEEE, 2025. https://doi.org/10.1109/lt64002.2025.10940824.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Arora, Sahil, Pranav Khare, and Sandeep Gupta. "A Machine Learning for Role Based Access Control: Optimizing Role Management and Permission Management." In 2024 First International Conference on Pioneering Developments in Computer Science & Digital Technologies (IC2SDT). IEEE, 2024. http://dx.doi.org/10.1109/ic2sdt62152.2024.10696236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Eisenhauer, Nicci. "Industrial Marketing & Sales in a Digital Age." In SSPC 2012 Greencoat. SSPC, 2012. https://doi.org/10.5006/s2012-00012.

Full text
Abstract:
Abstract The participation of sales, technical and marketing personnel in the development and implementation of an internet-based communications strategy that represents the company’s expertise in the format of education and information-sharing via various web-based tools will yield brand awareness, brand credibility and brand loyalty, while potentially shortening sales cycles. Using a balanced mix of traditional marketing tactics employed more effectively to drive traffic to informational venues such as blogs, forums and the corporate website for information in the spirit of furthering the in
APA, Harvard, Vancouver, ISO, and other styles
5

Rawal, Praveen Singh, and Divyashikha Sethia. "App Permission Classification dynamic Model(APCM)." In 2023 14th International Conference on Computing Communication and Networking Technologies (ICCCNT). IEEE, 2023. http://dx.doi.org/10.1109/icccnt56998.2023.10307201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pan, Lanlan Pan, Ruonan Qiu, Zhenming Chen, Gen Li, Dian Wen, and Minghui Yang. "Enhance Calling Definition Security for Android Custom Permission." In 4th International Conference on Natural Language Processing and Machine Learning. Academy and Industry Research Collaboration Center (AIRCC), 2023. http://dx.doi.org/10.5121/csit.2023.130808.

Full text
Abstract:
Custom permission is an important security feature of Android system. Permission resource app defines the custom permission. Resource provider app can share the app resources with the resource consumer apps which have gained the custom permission. However, evil app may potentially make permission squatting attacks, get ahead of legitimate permission source app to define the custom permission. If permission squatting attack is successful, then evil app can gain the access to the resource shared by resource provider app, and finally lead to security vulnerabilities and user data leakage. In this
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Shanlin, Weiyi Jiang, Yongming Yao, and Chenyu Xu. "Permission analysis based on android app store." In International Conference on Cyber Security, Artificial Intelligence, and Digital Economy (CSAIDE 2023), edited by Pavel Loskot and Shaozhang Niu. SPIE, 2023. http://dx.doi.org/10.1117/12.2681726.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rawal, Praveen Singh, and Divyashikha Sethia. "APEC: App Permission Classification with Efficient Clustering." In 2023 International Conference on Computational Intelligence for Information, Security and Communication Applications (CIISCA). IEEE, 2023. http://dx.doi.org/10.1109/ciisca59740.2023.00042.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Xueqing, Yue Leng, Wei Yang, Chengxiang Zhai, and Tao Xie. "Mining Android App Descriptions for Permission Requirements Recommendation." In 2018 IEEE 26th International Requirements Engineering Conference (RE). IEEE, 2018. http://dx.doi.org/10.1109/re.2018.00024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hu, Xiaocao, and Hui Wang. "Category-Aware App Permission Recommendation based on Sparse Linear Model." In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC). IEEE, 2022. http://dx.doi.org/10.1109/compsac54236.2022.00133.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!