Academic literature on the topic 'App Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'App Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "App Security"
Kumar, Prashant, Naveen Chauhan, Narottam Chand, and Lalit K. Awasthi. "SF-APP." International Journal of Web Services Research 15, no. 2 (April 2018): 47–66. http://dx.doi.org/10.4018/ijwsr.2018040103.
Full textKhan, Sajid Nabi, and Ikhlaq Ul Firdous. "Review on Android App Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 225–28. http://dx.doi.org/10.23956/ijarcsse/v7i4/0195.
Full textMeyer, Helen. "Bank restless with app-level security." Computers & Security 15, no. 3 (January 1996): 221. http://dx.doi.org/10.1016/0167-4048(96)90212-6.
Full textHurlburt, George, Jeffrey Voas, and Keith W. Miller. "Mobile-App Addiction: Threat to Security?" IT Professional 13, no. 6 (November 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.104.
Full textS.G, Tejashwini, Charitha B, Hemanjali V.T, Pavani C.S, and SwathiReddy D. "Hand-In-Hand -An Android Security App." International Journal of Engineering Trends and Technology 35, no. 6 (May 25, 2016): 247–49. http://dx.doi.org/10.14445/22315381/ijett-v35p253.
Full textCosta, Gabriele, Alessio Merlo, Luca Verderame, and Alessandro Armando. "Automatic security verification of mobile app configurations." Future Generation Computer Systems 80 (March 2018): 519–36. http://dx.doi.org/10.1016/j.future.2016.06.014.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textSankar, E., CH Aditya Karthik, and A. Sai Kiran. "Women Safety App." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1198–201. http://dx.doi.org/10.22214/ijraset.2022.40851.
Full textLai, Sen Tarng. "Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security." Applied Mechanics and Materials 182-183 (June 2012): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.2085.
Full textShan, Mei Jing. "Research on Data Security of Mobile Payment App." Applied Mechanics and Materials 511-512 (February 2014): 1201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1201.
Full textDissertations / Theses on the topic "App Security"
Taylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.
Full textChia, Pern Hui. "Information Security on the Web and App Platforms : An Economic and Socio-Behavioral Perspective." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Centre for Quantifiable Quality of Service in Communication Systems, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19751.
Full textNguyen, Duc Cuong [Verfasser]. "Improving Android app security and privacy with developers / Duc Cuong Nguyen." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1241117314/34.
Full textDell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.
Full textPujari, Medha Rani. "PortableVN: A Generic Mobile Application for Security Testbeds." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1564680092560925.
Full textBarreto, Razquin Oscar Maximiliano, Torpoco Karem Angelli Cardenas, Espinoza Cinthia Alejandra Rojas, Alvarado Sebastian Sanchez, and Quiroz Nicole Suheid Serna. "Proyecto Pulsos App." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654648.
Full textThis research document contains the implementation of an entrepreneurial project aimed at selling a mobile application service that will reduce the number of women suffering from harassment of any kind in the city of Lima, Peru. This research was conducted within the NSE "A" and "B" that have smartphones in Metropolitan Lima. This project is considered a disruptive idea due to the shortage of skills, lack of similar products, emergence of new technologies and trends. Likewise, it is considered important to address this issue with an effective product due to the continuous appearance of incidents, complaints and news that are manifested every day in the country. In order to make this project concrete, a detailed analysis was carried out to validate the profitability, scalability and viability of our service with the following topics: Validation of the business model, Development of the business plan, Operations plan, Human resources plan, Marketing plan, Corporate social responsibility plan, Financial plan and budgets. Finally, the application of this service to the business market can arouse interest in nonprofit organizations, civil organizations, political and government in order to generate a change in society after the existing problems.
Trabajo de investigación
Amini, Shahriyar. "Analyzing Mobile App Privacy Using Computation and Crowdsourcing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/327.
Full textBarton, Daniel John Trevino. "Usable Post-Classification Visualizations for Android Collusion Detection and Inspection." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/72286.
Full textMaster of Science
Gutierrez, Ramirez Pedro Reynaldo, Gago Jesus Martin Lopez, Cayo Alvaro Martin Peschiera, Robles Celia Elizabeth Torres, and Huby Johana Alexandra Vega. "Emprendimiento de negocio: jala a tu pata." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/626550.
Full textOur Business Entrepreneurship Assignment is about creating an app that is an intermediary between students acting as customers, who need to reach their destination through private cars safely, comfortably and quickly and students with cars playing as drivers that go by similar routes. We set as target market is young university students in the city of Lima from 18 to 24 years of socioeconomic level A, B and C. In addition, our service differs from the competition, since we have as policy to develop CSR activities to preserve the care of the environment. Also, it should be noted that the limeño market is highly attractive due to the growing demand where it says that this year and next year the demand for cars will increase by 250 thousand cars each year. For the development of the project, qualitative and quantitative analysis has been carried out, using tools such as interviews and survey application, with the purpose of determining the behavior of users and measuring the level of acceptance of our project. Finally, the financial plan and the main KPIs of business profitability will be explained and developed, which will allow demonstrating the sustainability, profitability and scalability of the business.
Trabajo de investigación
Wei, Fengguo. "Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7377.
Full textBooks on the topic "App Security"
service), SpringerLink (Online, ed. Pro ASP.NET Web API Security: Securing ASP.NET Web API. Berkeley, CA: Apress, 2013.
Find full textBush), United States President (1989-1993 :. Decision to order the divestment of a company located in Seattle, WA: Communication from the President of the United States transmitting a report on his decision to order the divestment of a company located in Seattle, WA; copy of the order, pursuant to 50 U.S.C. app. 2170. Washington: U.S. G.P.O., 1990.
Find full textSiriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-2050-4.
Full textSiriwardena, Prabath. Advanced API Security. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6817-8.
Full textVollmert, Robert. ADP security at NRL. Washington, DC: Naval Research Laboratory, 1986.
Find full textLongley, Dennis, and Michael Shain. Data & Computer Security. London: Palgrave Macmillan UK, 1989. http://dx.doi.org/10.1007/978-1-349-11170-1.
Full textEloff, Jan H. P., Les Labuschagne, Rossouw von Solms, and Jan Verschuren, eds. Information Security Management & Small Systems Security. Boston, MA: Springer US, 1999. http://dx.doi.org/10.1007/978-0-387-35575-7.
Full textTelecommunications, United States Veterans Administration Office of Data Management and. ODM&T ADP security handbook. Washington, DC: Veterans Administration, Office of Data Management and Telecommunications, 1986.
Find full textLakshmiraghavan, Badrinarayanan. Pro ASP.NET Web API Security. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5783-7.
Full textEloff, Jan H. P., Les Labuschagne, Rossouw Solms, and Gurpreet Dhillon, eds. Advances in Information Security Management & Small Systems Security. Boston, MA: Springer US, 2001. http://dx.doi.org/10.1007/b116849.
Full textBook chapters on the topic "App Security"
Wright, Steve. "SharePoint App Security." In Pro SharePoint 2013 App Development, 145–84. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-5885-8_6.
Full textGunasekera, Sheran. "Hacking Your App." In Android Apps Security, 91–119. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_5.
Full textLee, Henry, and Eugene Chuvyrov. "Security." In Beginning Windows Phone App Development, 479–512. Berkeley, CA: Apress, 2012. http://dx.doi.org/10.1007/978-1-4302-4135-5_19.
Full textRelan, Kunal. "iOS App Security Practices." In iOS Penetration Testing, 119–29. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2355-0_7.
Full textGunasekera, Sheran. "App Licensing and SafetyNet." In Android Apps Security, 35–56. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_3.
Full textGunasekera, Sheran. "Hacking Your App #2." In Android Apps Security, 145–72. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-1682-8_7.
Full textJiang, Liangjun. "Security." In iOS eCommerce App Development with Parse, 185–90. Berkeley, CA: Apress, 2015. http://dx.doi.org/10.1007/978-1-4842-1317-9_18.
Full textGupta, Rakesh. "Platform Security." In Salesforce Platform App Builder Certification, 53–91. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5479-0_3.
Full textHerath, Pushpa. "App Service Environments." In Azure Cloud Security for Absolute Beginners, 207–28. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7860-4_10.
Full textNorthern, Carlton, Michael Peck, Johann Thairu, and Vincent Sritapan. "Mobile Per-app Security Settings." In Advances in Intelligent Systems and Computing, 696–715. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-73100-7_51.
Full textConference papers on the topic "App Security"
Hedin, Daniel. "App security with JSFlow." In ICSE '16: 38th International Conference on Software Engineering. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/2897073.2897714.
Full textCox, Landon. "Session details: Session VIII: App Security & Privacy." In MobiSys'16: The 14th Annual International Conference on Mobile Systems, Applications, and Services. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3257203.
Full textMrabti, Almokhtar Ait El, Najim Ammari, Anas Abou El Kalam, Abdellah Ait Ouahman, and Mina De Montfort. "Mobile app security by fragmentation "MASF"." In ICC '17: Second International Conference on Internet of Things, Data and Cloud Computing. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3018896.3036371.
Full textGadient, Pascal, Marc-Andrea Tarnutzer, Oscar Nierstrasz, and Mohammad Ghafari. "Security Smells Pervade Mobile App Servers." In ESEM '21: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement. New York, NY, USA: ACM, 2021. http://dx.doi.org/10.1145/3475716.3475780.
Full textRavitch, Tristan, E. Rogan Creswick, Aaron Tomb, Adam Foltzer, Trevor Elliott, and Ledah Casburn. "Multi-App Security Analysis with FUSE." In the 4th Program Protection and Reverse Engineering Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2689702.2689705.
Full textBelenko, Vyacheslav, Dmitry Zegzhda, Petr Zegzhda, Semen Kort, Vladimir Chernenko, and Woosung Kim. "Security verification of the programs in webOS app store." In Security 2014. Science & Engineering Research Support soCiety, 2014. http://dx.doi.org/10.14257/astl.2014.58.12.
Full textHintz, Kenneth J., Christopher J. Hintz, Faris Almomen, Christian Adounvo, and Michael D' Amato. "THELMA: a mobile app for crowdsourcing environmental data." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2014. http://dx.doi.org/10.1117/12.2058690.
Full textCanova, Gamze, Melanie Volkamer, Clemens Bergmann, and Benjamin Reinheimer. "NoPhish App Evaluation: Lab and Retention Study." In Workshop on Usable Security. Reston, VA: Internet Society, 2015. http://dx.doi.org/10.14722/usec.2015.23009.
Full textCristalli, Stefano, Long Lu, Danilo Bruschi, and Andrea Lanzi. "Detecting (absent) app-to-app authentication on cross-device short-distance channels." In ACSAC '19: 2019 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3359789.3359814.
Full textKatamba, Ronald, and Brian Mutebi. "Jaguza livestock app, the app transforming livestock production and strengthening food security." In 2017 IST-Africa Week Conference (IST-Africa). IEEE, 2017. http://dx.doi.org/10.23919/istafrica.2017.8102352.
Full textReports on the topic "App Security"
Yu, Dongting, Andrew W. Moore, Chris Hall, and Ross Anderson. Security: a Killer App for SDN? Fort Belvoir, VA: Defense Technical Information Center, October 2014. http://dx.doi.org/10.21236/ada613601.
Full textAgarwal, Smisha, Madhu Jalan, Holly C. Wilcox, Ritu Sharma, Rachel Hill, Emily Pantalone, Johannes Thrul, Jacob C. Rainey, and Karen A. Robinson. Evaluation of Mental Health Mobile Applications. Agency for Healthcare Research and Quality (AHRQ), May 2022. http://dx.doi.org/10.23970/ahrqepctb41.
Full textWray, J. Generic Security Service API : C-bindings. RFC Editor, September 1993. http://dx.doi.org/10.17487/rfc1509.
Full textTerry, Stefanie F. S&S-PRG-036 ? SECURITY CONNECTION. Office of Scientific and Technical Information (OSTI), July 2016. http://dx.doi.org/10.2172/1494329.
Full textMelton, R. ADP Security Plan, Math Building, Room 1139. Office of Scientific and Technical Information (OSTI), August 1985. http://dx.doi.org/10.2172/79006.
Full textReiss, Peter T. Airline Safety & Security: An International Perspective. Fort Belvoir, VA: Defense Technical Information Center, October 1997. http://dx.doi.org/10.21236/ada351545.
Full textEverhart, Kathie. Computer security training & awareness course compendium. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4846.
Full textBrauer, F. P. ADP security plan, 320 Building, Room 110. Office of Scientific and Technical Information (OSTI), August 1985. http://dx.doi.org/10.2172/10121000.
Full textHolt, J. G., and J. D. Fluckiger. Approval of revised ADP security plan: National Security Technology, ROB/1401 and 1403. Office of Scientific and Technical Information (OSTI), June 1985. http://dx.doi.org/10.2172/31375.
Full textFlagg, Melissa, and Zachary Arnold. A New Institutional Approach to Research Security in the United States: Defending a Diverse R&D Ecosystem. Center for Security and Emerging Technology, January 2021. http://dx.doi.org/10.51593/20200051.
Full text