Статті в журналах з теми "APP PERMISSION"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "APP PERMISSION".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (September 5, 2019): 3699. http://dx.doi.org/10.3390/app9183699.
Повний текст джерелаNaga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.
Повний текст джерелаUllah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (January 13, 2022): 246. http://dx.doi.org/10.3390/electronics11020246.
Повний текст джерелаOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (September 24, 2019): 3997. http://dx.doi.org/10.3390/app9193997.
Повний текст джерелаPaul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (July 2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.
Повний текст джерелаNaderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (September 2, 2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.
Повний текст джерелаXiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 797. http://dx.doi.org/10.1177/1541931213601692.
Повний текст джерелаReimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (March 2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.
Повний текст джерелаLiu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (March 19, 2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.
Повний текст джерелаYilmaz, Saliha, and Mastaneh Davis. "Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model." European Conference on Cyber Warfare and Security 22, no. 1 (June 19, 2023): 717–24. http://dx.doi.org/10.34190/eccws.22.1.1453.
Повний текст джерелаEhsan, Adeel, Cagatay Catal, and Alok Mishra. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review." Sensors 22, no. 20 (October 18, 2022): 7928. http://dx.doi.org/10.3390/s22207928.
Повний текст джерелаAmirulbahar, Azis, and Yova Ruldeviyani. "ANALYSIS OF EFFECTS OF APP PERMISSION CONCERNS ON INTENTIONS TO DISCLOSE PERSONAL INFORMATION: A CASE STUDY OF MONEY TRANSFER SERVICE APP." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 9, no. 1 (August 14, 2023): 109–18. http://dx.doi.org/10.33480/jitk.v9i1.4316.
Повний текст джерелаAzam, Sami, Rajvinder Singh Sumra, Bharanidharan Shanmugam, Kheng Cher Yeo, Mirjam Jonokman, and Ganthan Narayana Samy. "Security Source Code Analysis of Applications in Android OS." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 30. http://dx.doi.org/10.14419/ijet.v7i4.15.21366.
Повний текст джерелаMarquez, Antonio Flores, and Jozef Goetz. "Certificate Management Application." International Journal on Engineering, Science and Technology 5, no. 3 (September 6, 2023): 191–211. http://dx.doi.org/10.46328/ijonest.165.
Повний текст джерелаChong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 796. http://dx.doi.org/10.1177/1541931213601691.
Повний текст джерелаMarsch, Maximilian, Jens Grossklags, and Sameer Patil. "Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (October 13, 2021): 1–35. http://dx.doi.org/10.1145/3479581.
Повний текст джерелаBagheri, Hamid, Alireza Sadeghi, Joshua Garcia, and Sam Malek. "COVERT: Compositional Analysis of Android Inter-App Permission Leakage." IEEE Transactions on Software Engineering 41, no. 9 (September 1, 2015): 866–86. http://dx.doi.org/10.1109/tse.2015.2419611.
Повний текст джерелаDemissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (September 15, 2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.
Повний текст джерелаSmullen, Daniel, Yuanyuan Feng, Shikun Aerin Zhang, and Norman Sadeh. "The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (January 1, 2020): 195–215. http://dx.doi.org/10.2478/popets-2020-0011.
Повний текст джерелаGao, Hongcan, Chenkai Guo, Guangdong Bai, Dengrong Huang, Zhen He, Yanfeng Wu, and Jing Xu. "Sharing runtime permission issues for developers based on similar-app review mining." Journal of Systems and Software 184 (February 2022): 111118. http://dx.doi.org/10.1016/j.jss.2021.111118.
Повний текст джерелаNamrud, Zakeya, Segla Kpodjedo, Ahmed Bali, and Chamseddine Talhi. "Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories." IEEE Access 10 (2022): 24240–54. http://dx.doi.org/10.1109/access.2022.3156083.
Повний текст джерелаDegirmenci, Kenan. "Mobile users’ information privacy concerns and the role of app permission requests." International Journal of Information Management 50 (February 2020): 261–72. http://dx.doi.org/10.1016/j.ijinfomgt.2019.05.010.
Повний текст джерелаDhanya Pramod, Manisha Patil,. "Enhancing Android Framework Used to Detect Unexpected Permission Authorization of Mobile Application." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (September 11, 2023): 998–1005. http://dx.doi.org/10.52783/tjjpt.v44.i3.420.
Повний текст джерелаAkbar, Fahad, Mehdi Hussain, Rafia Mumtaz, Qaiser Riaz, Ainuddin Wahid Abdul Wahab, and Ki-Hyun Jung. "Permissions-Based Detection of Android Malware Using Machine Learning." Symmetry 14, no. 4 (April 2, 2022): 718. http://dx.doi.org/10.3390/sym14040718.
Повний текст джерелаIsmail, Qatrunnada, Tousif Ahmed, Kelly Caine, Apu Kapadia, and Michael Reiter. "To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 119–37. http://dx.doi.org/10.1515/popets-2017-0041.
Повний текст джерелаEr-Rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "Estimate Risks Eate for Android Applications Using Android Permissions." International Journal of Mobile Computing and Multimedia Communications 12, no. 4 (October 2021): 1–15. http://dx.doi.org/10.4018/ijmcmc.289162.
Повний текст джерелаZebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (May 25, 2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.
Повний текст джерелаYuan, Hongli, and Yongchuan Tang. "MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty." Entropy 22, no. 7 (July 20, 2020): 792. http://dx.doi.org/10.3390/e22070792.
Повний текст джерелаZhang, Shijia, Yilin Liu, and Mahanth Gowda. "I Spy You." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (December 21, 2022): 1–31. http://dx.doi.org/10.1145/3569486.
Повний текст джерелаZhang, Shikun, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. "How Usable Are iOS App Privacy Labels?" Proceedings on Privacy Enhancing Technologies 2022, no. 4 (October 2022): 204–28. http://dx.doi.org/10.56553/popets-2022-0106.
Повний текст джерелаOlukoya, Oluwafemi, Lewis Mackenzie, and Inah Omoronyia. "Security-oriented view of app behaviour using textual descriptions and user-granted permission requests." Computers & Security 89 (February 2020): 101685. http://dx.doi.org/10.1016/j.cose.2019.101685.
Повний текст джерелаRamamurthy, Madhumitha. "Fraudster Mobile Apps Detector in Google Playstore." Journal of Computational and Theoretical Nanoscience 17, no. 4 (April 1, 2020): 1752–57. http://dx.doi.org/10.1166/jctn.2020.8437.
Повний текст джерелаPan, Elleen, Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes. "Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (October 1, 2018): 33–50. http://dx.doi.org/10.1515/popets-2018-0030.
Повний текст джерелаKim, Minki, Daehan Kim, Changha Hwang, Seongje Cho, Sangchul Han, and Minkyu Park. "Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions." Applied Sciences 11, no. 21 (November 1, 2021): 10244. http://dx.doi.org/10.3390/app112110244.
Повний текст джерелаLee, Han Seong, and Hyung-Woo Lee. "Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps." Journal of the Korea Convergence Society 8, no. 3 (March 28, 2017): 49–61. http://dx.doi.org/10.15207/jkcs.2017.8.3.049.
Повний текст джерелаMehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (January 24, 2019): 7. http://dx.doi.org/10.3390/informatics6010007.
Повний текст джерелаYang†, Yucheng, Jack West†, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz. "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 373–93. http://dx.doi.org/10.56553/popets-2022-0077.
Повний текст джерелаAbdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (October 7, 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.
Повний текст джерелаHan, Catherine, Irwin Reyes, Álvaro Feal, Joel Reardon, Primal Wijesekera, Narseo Vallina-Rodriguez, Amit Elazari, Kenneth A. Bamberger, and Serge Egelman. "The Price is (Not) Right: Comparing Privacy in Free and Paid Apps." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (July 1, 2020): 222–42. http://dx.doi.org/10.2478/popets-2020-0050.
Повний текст джерелаNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Повний текст джерелаPramestya, Komang Dea, and Putu Tuni Cakabawa Landra. "PERLINDUNGAN HUKUM ATAS KARYA SINEMATOGRAFI YANG DISEBARLUASKAN TANPA IZIN MELALUI APLIKASI TELEGRAM." Kertha Semaya : Journal Ilmu Hukum 10, no. 7 (June 2, 2022): 1587. http://dx.doi.org/10.24843/ks.2022.v10.i07.p10.
Повний текст джерелаNakrys, Marius, Sarunas Valinskas, Kasparas Aleknavicius, and Justinas Jonusas. "Pilot Investigation of Blood Pressure Control Using a Mobile App (Cardi.Health): Retrospective Chart Review Study." JMIR Cardio 7 (October 17, 2023): e48454. http://dx.doi.org/10.2196/48454.
Повний текст джерелаWahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.
Повний текст джерелаZakariya, R. Ahmad Imanullah, and Kalamullah Ramli. "Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 4 (August 30, 2023): 831. http://dx.doi.org/10.25126/jtiik.20241047029.
Повний текст джерелаHarkous, Hamza, Rameez Rahman, Bojan Karlas, and Karl Aberer. "The Curious Case of the PDF Converter that Likes Mozart: Dissecting and Mitigating the Privacy Risk of Personal Cloud Apps." Proceedings on Privacy Enhancing Technologies 2016, no. 4 (October 1, 2016): 123–43. http://dx.doi.org/10.1515/popets-2016-0032.
Повний текст джерелаPradeep, Amogh, Álvaro Feal, Julien Gamba, Ashwin Rao, Martina Lindorfer, Narseo Vallina-Rodriguez, and David Choffnes. "Not Your Average App: A Large-scale Privacy Analysis of Android Browsers." Proceedings on Privacy Enhancing Technologies 2023, no. 1 (January 2023): 29–46. http://dx.doi.org/10.56553/popets-2023-0003.
Повний текст джерелаLipson-Smith, R., F. White, G. Cooper, L. Serong, A. White, and A. Hyatt. "Harnessing Smartphone Technology to Improve Patient Engagement: Codesigning and Testing The SecondEars Consultation Audio Recording App for People With Cancer." Journal of Global Oncology 4, Supplement 2 (October 1, 2018): 109s. http://dx.doi.org/10.1200/jgo.18.46900.
Повний текст джерелаBonnéry, D. B., L. S. Pretorius, A. E. C. Jooste, A. D. W. Geering, and C. A. Gilligan. "Rational design of a survey protocol for avocado sunblotch viroid in commercial orchards to demonstrate pest freedom." PLOS ONE 18, no. 4 (April 11, 2023): e0277725. http://dx.doi.org/10.1371/journal.pone.0277725.
Повний текст джерелаMerchant, Parth, Kshitij Patil, Nikhil Panchal, and Prof Sanketi Raut. "A Web Based App for Land Registry on Blockchain." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (April 30, 2022): 2505–13. http://dx.doi.org/10.22214/ijraset.2022.41831.
Повний текст джерелаJacobs, Susanne D., Margaret O. Johnson, Elizabeth S. Miller, Mallika Patel, and Mary L. Affronti. "INNV-15. OPTIMIZING THE ROLE OF THE ADVANCED PRACTICE PROVIDER IN THE MANAGEMENT OF A SINGLE PATIENT INVESTIGATIONAL NEW DRUG (IND)." Neuro-Oncology 25, Supplement_5 (November 1, 2023): v159. http://dx.doi.org/10.1093/neuonc/noad179.0604.
Повний текст джерела