Journal articles on the topic 'APP PERMISSION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'APP PERMISSION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (September 5, 2019): 3699. http://dx.doi.org/10.3390/app9183699.
Full textNaga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.
Full textUllah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (January 13, 2022): 246. http://dx.doi.org/10.3390/electronics11020246.
Full textOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (September 24, 2019): 3997. http://dx.doi.org/10.3390/app9193997.
Full textPaul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (July 2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.
Full textNaderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (September 2, 2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.
Full textXiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 797. http://dx.doi.org/10.1177/1541931213601692.
Full textReimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (March 2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.
Full textLiu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (March 19, 2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.
Full textYilmaz, Saliha, and Mastaneh Davis. "Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 717–24. http://dx.doi.org/10.34190/eccws.22.1.1453.
Full textEhsan, Adeel, Cagatay Catal, and Alok Mishra. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review." Sensors 22, no. 20 (October 18, 2022): 7928. http://dx.doi.org/10.3390/s22207928.
Full textAmirulbahar, Azis, and Yova Ruldeviyani. "ANALYSIS OF EFFECTS OF APP PERMISSION CONCERNS ON INTENTIONS TO DISCLOSE PERSONAL INFORMATION: A CASE STUDY OF MONEY TRANSFER SERVICE APP." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 9, no. 1 (August 14, 2023): 109–18. http://dx.doi.org/10.33480/jitk.v9i1.4316.
Full textAzam, Sami, Rajvinder Singh Sumra, Bharanidharan Shanmugam, Kheng Cher Yeo, Mirjam Jonokman, and Ganthan Narayana Samy. "Security Source Code Analysis of Applications in Android OS." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 30. http://dx.doi.org/10.14419/ijet.v7i4.15.21366.
Full textMarquez, Antonio Flores, and Jozef Goetz. "Certificate Management Application." International Journal on Engineering, Science and Technology 5, no. 3 (September 6, 2023): 191–211. http://dx.doi.org/10.46328/ijonest.165.
Full textChong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 796. http://dx.doi.org/10.1177/1541931213601691.
Full textMarsch, Maximilian, Jens Grossklags, and Sameer Patil. "Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–35. http://dx.doi.org/10.1145/3479581.
Full textBagheri, Hamid, Alireza Sadeghi, Joshua Garcia, and Sam Malek. "COVERT: Compositional Analysis of Android Inter-App Permission Leakage." IEEE Transactions on Software Engineering 41, no. 9 (September 1, 2015): 866–86. http://dx.doi.org/10.1109/tse.2015.2419611.
Full textDemissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (September 15, 2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.
Full textSmullen, Daniel, Yuanyuan Feng, Shikun Aerin Zhang, and Norman Sadeh. "The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 195–215. http://dx.doi.org/10.2478/popets-2020-0011.
Full textGao, Hongcan, Chenkai Guo, Guangdong Bai, Dengrong Huang, Zhen He, Yanfeng Wu, and Jing Xu. "Sharing runtime permission issues for developers based on similar-app review mining." Journal of Systems and Software 184 (February 2022): 111118. http://dx.doi.org/10.1016/j.jss.2021.111118.
Full textNamrud, Zakeya, Segla Kpodjedo, Ahmed Bali, and Chamseddine Talhi. "Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories." IEEE Access 10 (2022): 24240–54. http://dx.doi.org/10.1109/access.2022.3156083.
Full textDegirmenci, Kenan. "Mobile users’ information privacy concerns and the role of app permission requests." International Journal of Information Management 50 (February 2020): 261–72. http://dx.doi.org/10.1016/j.ijinfomgt.2019.05.010.
Full textDhanya Pramod, Manisha Patil,. "Enhancing Android Framework Used to Detect Unexpected Permission Authorization of Mobile Application." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (September 11, 2023): 998–1005. http://dx.doi.org/10.52783/tjjpt.v44.i3.420.
Full textAkbar, Fahad, Mehdi Hussain, Rafia Mumtaz, Qaiser Riaz, Ainuddin Wahid Abdul Wahab, and Ki-Hyun Jung. "Permissions-Based Detection of Android Malware Using Machine Learning." Symmetry 14, no. 4 (April 2, 2022): 718. http://dx.doi.org/10.3390/sym14040718.
Full textIsmail, Qatrunnada, Tousif Ahmed, Kelly Caine, Apu Kapadia, and Michael Reiter. "To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 119–37. http://dx.doi.org/10.1515/popets-2017-0041.
Full textEr-Rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "Estimate Risks Eate for Android Applications Using Android Permissions." International Journal of Mobile Computing and Multimedia Communications 12, no. 4 (October 2021): 1–15. http://dx.doi.org/10.4018/ijmcmc.289162.
Full textZebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (May 25, 2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.
Full textYuan, Hongli, and Yongchuan Tang. "MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty." Entropy 22, no. 7 (July 20, 2020): 792. http://dx.doi.org/10.3390/e22070792.
Full textZhang, Shijia, Yilin Liu, and Mahanth Gowda. "I Spy You." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (December 21, 2022): 1–31. http://dx.doi.org/10.1145/3569486.
Full textZhang, Shikun, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. "How Usable Are iOS App Privacy Labels?" Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 204–28. http://dx.doi.org/10.56553/popets-2022-0106.
Full textOlukoya, Oluwafemi, Lewis Mackenzie, and Inah Omoronyia. "Security-oriented view of app behaviour using textual descriptions and user-granted permission requests." Computers & Security 89 (February 2020): 101685. http://dx.doi.org/10.1016/j.cose.2019.101685.
Full textRamamurthy, Madhumitha. "Fraudster Mobile Apps Detector in Google Playstore." Journal of Computational and Theoretical Nanoscience 17, no. 4 (April 1, 2020): 1752–57. http://dx.doi.org/10.1166/jctn.2020.8437.
Full textPan, Elleen, Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes. "Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 33–50. http://dx.doi.org/10.1515/popets-2018-0030.
Full textKim, Minki, Daehan Kim, Changha Hwang, Seongje Cho, Sangchul Han, and Minkyu Park. "Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions." Applied Sciences 11, no. 21 (November 1, 2021): 10244. http://dx.doi.org/10.3390/app112110244.
Full textLee, Han Seong, and Hyung-Woo Lee. "Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps." Journal of the Korea Convergence Society 8, no. 3 (March 28, 2017): 49–61. http://dx.doi.org/10.15207/jkcs.2017.8.3.049.
Full textMehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (January 24, 2019): 7. http://dx.doi.org/10.3390/informatics6010007.
Full textYang†, Yucheng, Jack West†, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz. "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 373–93. http://dx.doi.org/10.56553/popets-2022-0077.
Full textAbdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.
Full textHan, Catherine, Irwin Reyes, Álvaro Feal, Joel Reardon, Primal Wijesekera, Narseo Vallina-Rodriguez, Amit Elazari, Kenneth A. Bamberger, and Serge Egelman. "The Price is (Not) Right: Comparing Privacy in Free and Paid Apps." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 222–42. http://dx.doi.org/10.2478/popets-2020-0050.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textPramestya, Komang Dea, and Putu Tuni Cakabawa Landra. "PERLINDUNGAN HUKUM ATAS KARYA SINEMATOGRAFI YANG DISEBARLUASKAN TANPA IZIN MELALUI APLIKASI TELEGRAM." Kertha Semaya : Journal Ilmu Hukum 10, no. 7 (June 2, 2022): 1587. http://dx.doi.org/10.24843/ks.2022.v10.i07.p10.
Full textNakrys, Marius, Sarunas Valinskas, Kasparas Aleknavicius, and Justinas Jonusas. "Pilot Investigation of Blood Pressure Control Using a Mobile App (Cardi.Health): Retrospective Chart Review Study." JMIR Cardio 7 (October 17, 2023): e48454. http://dx.doi.org/10.2196/48454.
Full textWahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.
Full textZakariya, R. Ahmad Imanullah, and Kalamullah Ramli. "Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 4 (August 30, 2023): 831. http://dx.doi.org/10.25126/jtiik.20241047029.
Full textHarkous, Hamza, Rameez Rahman, Bojan Karlas, and Karl Aberer. "The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 123–43. http://dx.doi.org/10.1515/popets-2016-0032.
Full textPradeep, Amogh, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, and David Choffnes. "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 29–46. http://dx.doi.org/10.56553/popets-2023-0003.
Full textLipson-Smith, R., F. White, G. Cooper, L. Serong, A. White, and A. Hyatt. "Harnessing Smartphone Technology to Improve Patient Engagement: Codesigning and Testing The SecondEars Consultation Audio Recording App for People With Cancer." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 109s. http://dx.doi.org/10.1200/jgo.18.46900.
Full textBonnéry, D. B., L. S. Pretorius, A. E. C. Jooste, A. D. W. Geering, and C. A. Gilligan. "Rational design of a survey protocol for avocado sunblotch viroid in commercial orchards to demonstrate pest freedom." PLOS ONE 18, no. 4 (April 11, 2023): e0277725. http://dx.doi.org/10.1371/journal.pone.0277725.
Full textMerchant, Parth, Kshitij Patil, Nikhil Panchal, and Prof Sanketi Raut. "A Web Based App for Land Registry on Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2505–13. http://dx.doi.org/10.22214/ijraset.2022.41831.
Full textJacobs, Susanne D., Margaret O. Johnson, Elizabeth S. Miller, Mallika Patel, and Mary L. Affronti. "INNV-15. OPTIMIZING THE ROLE OF THE ADVANCED PRACTICE PROVIDER IN THE MANAGEMENT OF A SINGLE PATIENT INVESTIGATIONAL NEW DRUG (IND)." Neuro-Oncology 25, Supplement_5 (November 1, 2023): v159. http://dx.doi.org/10.1093/neuonc/noad179.0604.
Full text