Journal articles on the topic 'APP PERMISSION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'APP PERMISSION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Xu, Guosheng, Shengwei Xu, Chuan Gao, Bo Wang, and Guoai Xu. "PerHelper: Helping Developers Make Better Decisions on Permission Uses in Android Apps." Applied Sciences 9, no. 18 (2019): 3699. http://dx.doi.org/10.3390/app9183699.
Full textUllah, Salim, Muhammad Sohail Khan, Choonhwa Lee, and Muhammad Hanif. "Understanding Users’ Behavior towards Applications Privacy Policies." Electronics 11, no. 2 (2022): 246. http://dx.doi.org/10.3390/electronics11020246.
Full textNaga Malleswari, D., A. Dhavalya, V. Divya Sai, and K. Srikanth. "A detailed study on risk assessment of mobile app permissions." International Journal of Engineering & Technology 7, no. 1.1 (2017): 297. http://dx.doi.org/10.14419/ijet.v7i1.1.9706.
Full textOnik, Md Mehedi Hassan, Chul-Soo Kim, Nam-Yong Lee, and Jinhong Yang. "Personal Information Classification on Aggregated Android Application’s Permissions." Applied Sciences 9, no. 19 (2019): 3997. http://dx.doi.org/10.3390/app9193997.
Full textKarri, Praveen Kumar, D. Jaya Kumari, and Sowmya Sree Karri. "A Scalable Malware Detection Approach through Significant Permission Identification for Android Devices." International Journal of Innovation in Multidisciplinary Scientific Research 02, no. 01 (2024): 24–29. http://dx.doi.org/10.61239/ijimsr.2024.2113.
Full textPaul, Nishtha, Arpita Jadhav Bhatt, Sakeena Rizvi, and Shubhangi. "Malware Detection in Android Apps Using Static Analysis." Journal of Cases on Information Technology 24, no. 3 (2022): 1–25. http://dx.doi.org/10.4018/jcit.20220701.oa6.
Full textXiong, Aiping, Huangyi Ge, Wanling Zou, Ninghui Li, and Robert W. Proctor. "Increasing the Influence of Permission Safety on App Selections by Changes in Visual Representation." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 797. http://dx.doi.org/10.1177/1541931213601692.
Full textNaderi, Hamid, and Behzad Kiani. "Security Challenges in Android mHealth Apps Permissions: A Case Study of Persian Apps." Frontiers in Health Informatics 9, no. 1 (2020): 41. http://dx.doi.org/10.30699/fhi.v9i1.224.
Full textReimer, Helmut. "App „Permission Watcher“ für Android-Smartphones." Datenschutz und Datensicherheit - DuD 36, no. 3 (2012): 218. http://dx.doi.org/10.1007/s11623-012-0079-5.
Full textLiu, Zhongxin, Xin Xia, David Lo, and John Grundy. "Automatic, highly accurate app permission recommendation." Automated Software Engineering 26, no. 2 (2019): 241–74. http://dx.doi.org/10.1007/s10515-019-00254-6.
Full textYilmaz, Saliha, and Mastaneh Davis. "Hidden Permissions on Android: A Permission-Based Android Mobile Privacy Risk Model." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 717–24. http://dx.doi.org/10.34190/eccws.22.1.1453.
Full textAmirulbahar, Azis, and Yova Ruldeviyani. "ANALYSIS OF EFFECTS OF APP PERMISSION CONCERNS ON INTENTIONS TO DISCLOSE PERSONAL INFORMATION: A CASE STUDY OF MONEY TRANSFER SERVICE APP." JITK (Jurnal Ilmu Pengetahuan dan Teknologi Komputer) 9, no. 1 (2023): 109–18. http://dx.doi.org/10.33480/jitk.v9i1.4316.
Full textEhsan, Adeel, Cagatay Catal, and Alok Mishra. "Detecting Malware by Analyzing App Permissions on Android Platform: A Systematic Literature Review." Sensors 22, no. 20 (2022): 7928. http://dx.doi.org/10.3390/s22207928.
Full textAzam, Sami, Rajvinder Singh Sumra, Bharanidharan Shanmugam, Kheng Cher Yeo, Mirjam Jonokman, and Ganthan Narayana Samy. "Security Source Code Analysis of Applications in Android OS." International Journal of Engineering & Technology 7, no. 4.15 (2018): 30. http://dx.doi.org/10.14419/ijet.v7i4.15.21366.
Full textMarquez, Antonio Flores, and Jozef Goetz. "Certificate Management Application." International Journal on Engineering, Science and Technology 5, no. 3 (2023): 191–211. http://dx.doi.org/10.46328/ijonest.165.
Full textChong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 796. http://dx.doi.org/10.1177/1541931213601691.
Full textChe, Jiarui, Chenkai Guo, Naipeng Dong, et al. "Uncovering API-Scope Misalignment in the App-in-App Ecosystem." Proceedings of the ACM on Software Engineering 2, ISSTA (2025): 1933–54. https://doi.org/10.1145/3728962.
Full textMarsch, Maximilian, Jens Grossklags, and Sameer Patil. "Won't You Think of Others?: Interdependent Privacy in Smartphone App Permissions." Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021): 1–35. http://dx.doi.org/10.1145/3479581.
Full textBagheri, Hamid, Alireza Sadeghi, Joshua Garcia, and Sam Malek. "COVERT: Compositional Analysis of Android Inter-App Permission Leakage." IEEE Transactions on Software Engineering 41, no. 9 (2015): 866–86. http://dx.doi.org/10.1109/tse.2015.2419611.
Full textDemissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.
Full textSun, Zhuo, Dandan Zhang, Xiaoning Gao, and Yan Jin. "The impact of privacy authorization framing in mobile apps on privacy disclosure: a regulatory focus approach." Information Research an international electronic journal 30, iConf (2025): 476–85. https://doi.org/10.47989/ir30iconf47299.
Full textGautam, Abhishek. "PermiToggle: A Lightweight Mobile Application for Permission Awareness and Data Access Control." International Journal for Research in Applied Science and Engineering Technology 13, no. 5 (2025): 1936–41. https://doi.org/10.22214/ijraset.2025.70500.
Full textSmullen, Daniel, Yuanyuan Feng, Shikun Aerin Zhang, and Norman Sadeh. "The Best of Both Worlds: Mitigating Trade-offs Between Accuracy and User Burden in Capturing Mobile App Privacy Preferences." Proceedings on Privacy Enhancing Technologies 2020, no. 1 (2020): 195–215. http://dx.doi.org/10.2478/popets-2020-0011.
Full textS., Sashikumar, Vijay Babu G., and Angel Ingnishyaa F. "OPTIMIZATION OF PRIVACY AWARENESS OF MOBILE DATA." International Journal of Advanced Trends in Engineering and Technology (IJATET) 4, no. 1 (2019): 31–37. https://doi.org/10.5281/zenodo.3634343.
Full textTchomté, Naomi Dassi, Franklin Tchakounté, Clovis Kenmogne Tchuinte, and Kalum Priyanath Udagepola. "RetrieveDroid: k-NN Performance Evaluation of Distance Measurement Schemes for Android Malware Detection Using Case-Based Retrieval." European Journal of Information Technologies and Computer Science 4, no. 2 (2024): 16–21. http://dx.doi.org/10.24018/compute.2024.4.2.126.
Full textGao, Hongcan, Chenkai Guo, Guangdong Bai, et al. "Sharing runtime permission issues for developers based on similar-app review mining." Journal of Systems and Software 184 (February 2022): 111118. http://dx.doi.org/10.1016/j.jss.2021.111118.
Full textNamrud, Zakeya, Segla Kpodjedo, Ahmed Bali, and Chamseddine Talhi. "Deep-Layer Clustering to Identify Permission Usage Patterns of Android App Categories." IEEE Access 10 (2022): 24240–54. http://dx.doi.org/10.1109/access.2022.3156083.
Full textDegirmenci, Kenan. "Mobile users’ information privacy concerns and the role of app permission requests." International Journal of Information Management 50 (February 2020): 261–72. http://dx.doi.org/10.1016/j.ijinfomgt.2019.05.010.
Full textIsmail, Qatrunnada, Tousif Ahmed, Kelly Caine, Apu Kapadia, and Michael Reiter. "To Permit or Not to Permit, That is the Usability Question: Crowdsourcing Mobile Apps’ Privacy Permission Settings." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 119–37. http://dx.doi.org/10.1515/popets-2017-0041.
Full textDhanya Pramod, Manisha Patil,. "Enhancing Android Framework Used to Detect Unexpected Permission Authorization of Mobile Application." Tuijin Jishu/Journal of Propulsion Technology 44, no. 3 (2023): 998–1005. http://dx.doi.org/10.52783/tjjpt.v44.i3.420.
Full textAkbar, Fahad, Mehdi Hussain, Rafia Mumtaz, Qaiser Riaz, Ainuddin Wahid Abdul Wahab, and Ki-Hyun Jung. "Permissions-Based Detection of Android Malware Using Machine Learning." Symmetry 14, no. 4 (2022): 718. http://dx.doi.org/10.3390/sym14040718.
Full textBeitis, Angelos, Jeroen Robben, Alexander Matern, et al. "LANShield: Analysing and Protecting Local Network Access on Mobile Devices." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 5–23. https://doi.org/10.56553/popets-2025-0116.
Full textEr-Rajy, Latifa, My Ahmed El Kiram, and Mohamed El Ghazouani. "Estimate Risks Eate for Android Applications Using Android Permissions." International Journal of Mobile Computing and Multimedia Communications 12, no. 4 (2021): 1–15. http://dx.doi.org/10.4018/ijmcmc.289162.
Full textZebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.
Full textYuan, Hongli, and Yongchuan Tang. "MADFU: An Improved Malicious Application Detection Method Based on Features Uncertainty." Entropy 22, no. 7 (2020): 792. http://dx.doi.org/10.3390/e22070792.
Full textZhang, Shijia, Yilin Liu, and Mahanth Gowda. "I Spy You." Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, no. 4 (2022): 1–31. http://dx.doi.org/10.1145/3569486.
Full textRamamurthy, Madhumitha. "Fraudster Mobile Apps Detector in Google Playstore." Journal of Computational and Theoretical Nanoscience 17, no. 4 (2020): 1752–57. http://dx.doi.org/10.1166/jctn.2020.8437.
Full textZhang, Shikun, Yuanyuan Feng, Yaxing Yao, Lorrie Faith Cranor, and Norman Sadeh. "How Usable Are iOS App Privacy Labels?" Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 204–28. http://dx.doi.org/10.56553/popets-2022-0106.
Full textOlukoya, Oluwafemi, Lewis Mackenzie, and Inah Omoronyia. "Security-oriented view of app behaviour using textual descriptions and user-granted permission requests." Computers & Security 89 (February 2020): 101685. http://dx.doi.org/10.1016/j.cose.2019.101685.
Full textRao, M. Devanand. "Privacy Concerns in Android Applications: An Overview of Risks and Solutions." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–8. https://doi.org/10.55041/ijsrem.ncft003.
Full textPan, Elleen, Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes. "Panoptispy: Characterizing Audio and Video Exfiltration from Android Applications." Proceedings on Privacy Enhancing Technologies 2018, no. 4 (2018): 33–50. http://dx.doi.org/10.1515/popets-2018-0030.
Full textKim, Minki, Daehan Kim, Changha Hwang, Seongje Cho, Sangchul Han, and Minkyu Park. "Machine-Learning-Based Android Malware Family Classification Using Built-In and Custom Permissions." Applied Sciences 11, no. 21 (2021): 10244. http://dx.doi.org/10.3390/app112110244.
Full textLee, Han Seong, and Hyung-Woo Lee. "Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps." Journal of the Korea Convergence Society 8, no. 3 (2017): 49–61. http://dx.doi.org/10.15207/jkcs.2017.8.3.049.
Full textYang†, Yucheng, Jack West†, George K. Thiruvathukal, Neil Klingensmith, and Kassem Fawaz. "Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (2022): 373–93. http://dx.doi.org/10.56553/popets-2022-0077.
Full textZakariya, R. Ahmad Imanullah, and Kalamullah Ramli. "Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes." Jurnal Teknologi Informasi dan Ilmu Komputer 10, no. 4 (2023): 831–42. https://doi.org/10.25126/jtiik.2024107029.
Full textMehrnezhad, Maryam, and Ehsan Toreini. "What Is This Sensor and Does This App Need Access to It?" Informatics 6, no. 1 (2019): 7. http://dx.doi.org/10.3390/informatics6010007.
Full textNisha, Badwaik* Vijay Bagdi. "AN SUPERVISED METHOD FOR DETECTION MALWARE BY USING MACHINE LEARNING ALGORITHM." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 12 (2016): 287–90. https://doi.org/10.5281/zenodo.192894.
Full textRatul, Sikder, Shohel Khan Md, Shohrab Hossain Md, and Zada Khan Wazir. "A survey on android security: development and deployment hindrance and best practices." TELKOMNIKA Telecommunication, Computing, Electronics and Control 18, no. 1 (2020): 485–99. https://doi.org/10.12928/TELKOMNIKA.v18i1.13288.
Full textAcheampong, Rebecca, Dorin-Mircea Popovici, Titus C. Balan, Alexandre Rekeraho, and Ionut-Alexandru Oprea. "A Cybersecurity Risk Assessment for Enhanced Security in Virtual Reality." Information 16, no. 6 (2025): 430. https://doi.org/10.3390/info16060430.
Full textAbdullah, Zubaile, and Madihah Mohd Saudi. "RAPID-Risk Assessment of Android Permission and Application Programming Interface (API) Call for Android Botnet." International Journal of Engineering & Technology 7, no. 4.15 (2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.15.21370.
Full text