Dissertations / Theses on the topic 'App Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'App Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Taylor, Vincent. "Security and privacy in app ecosystems." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:01f3b0ca-b24e-4949-9efa-ec56dfba7a36.
Full textChia, Pern Hui. "Information Security on the Web and App Platforms : An Economic and Socio-Behavioral Perspective." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Centre for Quantifiable Quality of Service in Communication Systems, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-19751.
Full textNguyen, Duc Cuong [Verfasser]. "Improving Android app security and privacy with developers / Duc Cuong Nguyen." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1241117314/34.
Full textDell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.
Full textPujari, Medha Rani. "PortableVN: A Generic Mobile Application for Security Testbeds." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1564680092560925.
Full textBarreto, Razquin Oscar Maximiliano, Torpoco Karem Angelli Cardenas, Espinoza Cinthia Alejandra Rojas, Alvarado Sebastian Sanchez, and Quiroz Nicole Suheid Serna. "Proyecto Pulsos App." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654648.
Full textThis research document contains the implementation of an entrepreneurial project aimed at selling a mobile application service that will reduce the number of women suffering from harassment of any kind in the city of Lima, Peru. This research was conducted within the NSE "A" and "B" that have smartphones in Metropolitan Lima. This project is considered a disruptive idea due to the shortage of skills, lack of similar products, emergence of new technologies and trends. Likewise, it is considered important to address this issue with an effective product due to the continuous appearance of incidents, complaints and news that are manifested every day in the country. In order to make this project concrete, a detailed analysis was carried out to validate the profitability, scalability and viability of our service with the following topics: Validation of the business model, Development of the business plan, Operations plan, Human resources plan, Marketing plan, Corporate social responsibility plan, Financial plan and budgets. Finally, the application of this service to the business market can arouse interest in nonprofit organizations, civil organizations, political and government in order to generate a change in society after the existing problems.
Trabajo de investigación
Amini, Shahriyar. "Analyzing Mobile App Privacy Using Computation and Crowdsourcing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/327.
Full textBarton, Daniel John Trevino. "Usable Post-Classification Visualizations for Android Collusion Detection and Inspection." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/72286.
Full textMaster of Science
Gutierrez, Ramirez Pedro Reynaldo, Gago Jesus Martin Lopez, Cayo Alvaro Martin Peschiera, Robles Celia Elizabeth Torres, and Huby Johana Alexandra Vega. "Emprendimiento de negocio: jala a tu pata." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2019. http://hdl.handle.net/10757/626550.
Full textOur Business Entrepreneurship Assignment is about creating an app that is an intermediary between students acting as customers, who need to reach their destination through private cars safely, comfortably and quickly and students with cars playing as drivers that go by similar routes. We set as target market is young university students in the city of Lima from 18 to 24 years of socioeconomic level A, B and C. In addition, our service differs from the competition, since we have as policy to develop CSR activities to preserve the care of the environment. Also, it should be noted that the limeño market is highly attractive due to the growing demand where it says that this year and next year the demand for cars will increase by 250 thousand cars each year. For the development of the project, qualitative and quantitative analysis has been carried out, using tools such as interviews and survey application, with the purpose of determining the behavior of users and measuring the level of acceptance of our project. Finally, the financial plan and the main KPIs of business profitability will be explained and developed, which will allow demonstrating the sustainability, profitability and scalability of the business.
Trabajo de investigación
Wei, Fengguo. "Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7377.
Full textKulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Full textSolimeo, Alfonso. "Framework per l'analisi dinamica di vulnerabilità e penetration testing di App iOS." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/14827/.
Full textBjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Full textMUTTI, Simone. "Policy and Security Conguration Management in Distributed Systems." Doctoral thesis, Università degli studi di Bergamo, 2015. http://hdl.handle.net/10446/49849.
Full textLu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.
Full textValera, Gómez Gloria Cecilia. "APP de entrenamiento en realidad aumentada para Prevención de Riesgos Laborales." Master's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/654484.
Full textThis paper is a business plan for the marketing of a mobile application for augmented reality training in risk prevention through smartphones in the city of Lima. The proposal was validated by interviews to opinion leaders and surveys to people aged 18 to 60 years. In addition, a market segmentation analysis was performed to determine how many companies could benefit from the app. Through market segmentation and definition, it was determined that the target market is large and medium-sized enterprises of the industrial sector, which represent 0.99% of the total number in Lima Metropolitan Area. It was decided to target 2.33% of the enterprises identified. As regards marketing strategies, the distribution channel will be direct, through sellers and digital channels. With this proposal, the app for augmented reality training in risk prevention is expected to become a market leader in AR training in the medium term, offering high time flexibility and efficiency. To execute the Project, an initial investment of PEN 63,936.00 is required, which will be obtained through bank loan (70%) and capital contribution (30%). It is estimated to achieve a NPV of PEN 750,111 with an IRR of 50%.
Trabajo de investigación
Forsman, Robin, and Michal Sisak. "Challenges in software development of mobile apps in e-health." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20487.
Full textBocanegra, Farfán Silvia Lorena, Fernandez Amy Herrera, Muga Mariela Platas, and de León Rodriguez Tamara Nicole Ponce. "Venta de medidor digital de GLP y aplicación móvil." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2020. http://hdl.handle.net/10757/652922.
Full textChanges brought by new technology have made many businesses worry more about keeping control of their processes and constantly search for new ways to reduce cost through it. That is why innovation is an important point in these changes we call digital transformation – understood as the digital capacity of processes, products and assets to improve efficiency –allowing companies to find new ways to achieve their objectives. All the facts mentioned before, were the key point to identify a business opportunity and the right market niche to develop it. Businesses like restaurants, hotels and other service providers, with a need of GLP gas to operate, don’t have a precise way to measure their consumption nor know when they need to call for a refill to avoid unwanted pauses on their operations. The presented business plan proposes the marketing of digital GLP gas meter compatible with stationary tanks under 1,320 GLN capacity. This meter will work along with a custom designed mobile app, letting the business owner know in real time the tank occupancy level, as well as the present consumption, monthly average and estimated date to place a new purchase order for a refill. Considering this, we can conclude the present proposal covers and exceeds the needs and expectations of the target market.
Trabajo de investigación
Dahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.
Full textBengtsson, Filip, and Matteo Madrusan. "Near Field Communication Security concerns & applicable security in Android." Thesis, Högskolan Kristianstad, Fakulteten för naturvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-20996.
Full textOzment, James Andrew. "Vulnerability discovery & software security." Thesis, University of Cambridge, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613340.
Full textViklund, Åsa. "National Security, Gendered Insecurity : Feminist Perspectives on Militarism, Masculinities & Security." Thesis, Teologiska högskolan Stockholm, Avdelningen för mänskliga rättigheter, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ths:diva-219.
Full textGures, Gulsah. "Security Dimesion Of Turkey'." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613026/index.pdf.
Full texts relations with Russia during the period between 2000 and 2010. In this context, political, military and energy aspects of the security relations between Turkey and Russia are examined in detail. Contrary to the views that conceive the recent rapprochement in Turkish-Russian relations as &lsquo
strategic partnership&rsquo
or a form of cooperation that has the potential of reaching the level of strategic partnership, the thesis argues that these countries have developed their bilateral relations in the form of pragmatic cooperation due to the existing limits to the deeper levels of cooperation in the security field. It seems that the euphoria of rapprochement between two countries is resulted from the diminution of mutual threat levels as well as the proliferation of common interest areas. Nevertheless, despite these developments, both Turkey and Russia continue to consider their relations as a form of pragmatic cooperation rather than strategic partnership.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Cook, Rowan M. Banking & Finance Australian School of Business UNSW. "Security market design & execution cost." Awarded by:University of New South Wales. School of Banking and Finance, 2007. http://handle.unsw.edu.au/1959.4/31457.
Full textMalik, Mohinder Singh. "Human rights & the security forces /." Delhi : Bright Law House, 2004. http://www.gbv.de/dms/spk/sbb/recht/toc/477282911.pdf.
Full textNewswander, Chad B. "Presidential Security: Bodies, Bubbles, & Bunkers." Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/77042.
Full textPh. D.
Punjabi, V. (Vikesh). "Security risks:threats & rewards in social media." Master's thesis, University of Oulu, 2015. http://urn.fi/URN:NBN:fi:oulu-201502111069.
Full textJohan, Boström. "Compliance & Standards - The Journey To Security." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446601.
Full textKronschnabl, Stefan. "IT-Security Governance /." Regensburg : Univ.-Verl, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=017045454&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA.
Full textYetter, Richard B. "Darknets, cybercrime & the onion router| Anonymity & security in cyberspace." Thesis, Utica College, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1586579.
Full textAnonymizing Internet technologies present unique challenges to law enforcement and intelligence organizations. Tor is an anonymity technology that has received extensive media coverage after a virtual black market hidden by its network was seized by the FBI in 2013. Anonymizing technologies have legitimate purposes, and as states increasingly employ sophisticated Internet censorship and surveillance techniques, they are becoming increasingly relevant. This study examines the creation of the modern Internet, explores the drastic changes that have taken place, and takes an in-depth look at intended and unintended uses of anonymizing technologies.
Fries, Steven M. "The underwriting of security issues." Thesis, University of Oxford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.303557.
Full textAmornraksa, Thumrongrat. "Data security for multimedia communications." Thesis, University of Surrey, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298091.
Full textStendahl, Jonas. "Domain-Driven Security : Injection & Cross-site scripting." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-189326.
Full textZhou, He. "High Performance Computing Architecture with Security." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/578611.
Full textFolke, Fredrik. "Security for home, small & medium sized enterprises IPv6 networks : Security using simple network equipment." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98295.
Full textDetta projekt kommer att undersöka och presentera olika hot som ett IPv6 nätverk kan utsättas för samt de vanligaste skydds mekanismer som används idag, med fokus på nätverkets skallskydd mellan det interna lokala nätet och det yttre publika Internet. I stort sätt all Internet ansluten utrustning och nätverk är exponerad och påverkad i någon grad av säkerhets brister, säkerhet är en viktig del i stort sätt alla nätverk oavsett syfte eller verksamhet. Genom ett ständigt växande Internet börjar de 32-bitar adresser tillhörande IPv4 nätet ta slut, vilket gör behovet av att immigrera till 128-bitar adresser på IPv6 nätet allt mer kritiskt. Med IPv6 kommer nya säkerhetshot, samt att även vissa äldre hot kvarstår, som kräver en förståelse av perimeter skydd. I denna rapport säkrar vi en hemma router och beskriver för varje steg tillvägagångssättet för att hem och små företagare ska få möjlighet att skydda sina IPv6 nätverk till en relativt låg kostnad.
Wulf, Lars. "Interaction and security in distributed computing." Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.362116.
Full textShafie-Pour, A. R. "Real-time power system security assessment." Thesis, Durham University, 1989. http://etheses.dur.ac.uk/9303/.
Full textO'Neill, Mark Thomas. "The Security Layer." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/7761.
Full textSchnarz, Pierre [Verfasser]. "Security Patterns for AMP-based Embedded Systems / Pierre Schnarz." München : Verlag Dr. Hut, 2019. http://d-nb.info/118851640X/34.
Full textSöder, Rickard. "Climate Change & (In)Security : Practical Implications of Securitization." Thesis, Uppsala universitet, Institutionen för freds- och konfliktforskning, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-385728.
Full textSoewito, Benfano. "Adaptive Security In Computer Networks." Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1879096201&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full text"Department of Electrical and Computer Engineering." Keywords: Adaptive security, Computer networks, Intrusion detection. Includes bibliographical references (p. 78-84). Also available online.
Turkoglu, Burcin. "Russia'." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610615/index.pdf.
Full texts presidency. Among soft security challenges, Russia prioritizes especially terrorism, transnational organized crime and energy security. The thesis is composed of six chapters. The introductory first chapter is followed by the second chapter examining the role of soft security in Russian national security. The following three chapters discuss Russia&rsquo
s soft security challenges of terrorism, transnational organized crime and energy security respectively whereas the sixth chapter concludes the thesis.
Yialelis, Nikolaos. "Domain-based security for distributed object systems." Thesis, Imperial College London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.244056.
Full textKarger, Paul Ashley. "Improving security and performance for capability systems." Thesis, University of Cambridge, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293032.
Full textAsghar, Gulfam, and Qanit Jawed Azmi. "Security Issues of SIP." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6018.
Full textAhmad, Nadeem, and M. Kashif Habib. "Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5327.
Full textKonfidentiella uppgifter via Internet blir vanligare varje dag. Personer och organisationer skickar sina konfidentiella uppgifter elektroniskt. Det är också vanligt att hackare mot dessa nät. I dagens tider, skydd av data, programvara och hårdvara från virus är, nu mer än någonsin ett behov och inte bara en oro. Vad du behöver veta om nätverk i dessa dagar? Hur säkerheten genomförs för att säkerställa ett nätverk? Hur säkerheten hanteras? I denna skrift kommer vi att försöka ta itu med dessa frågor och ge en uppfattning om var vi nu står med säkerheten för nätet.
Ghorbanian, Sara, and Glenn Fryklund. "Improving DLP system security." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5453.
Full textKravchenko, Maxim. "Evaluation of Security of ServiceWorker and Related APIs." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-75875.
Full textAkbari, Koochaksaraee Amir. "End-User Security & Privacy Behaviour on Social Media: Exploring Posture, Proficiency & Practice." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39310.
Full text