Journal articles on the topic 'App Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'App Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Prashant, Naveen Chauhan, Narottam Chand, and Lalit K. Awasthi. "SF-APP." International Journal of Web Services Research 15, no. 2 (April 2018): 47–66. http://dx.doi.org/10.4018/ijwsr.2018040103.
Full textKhan, Sajid Nabi, and Ikhlaq Ul Firdous. "Review on Android App Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 225–28. http://dx.doi.org/10.23956/ijarcsse/v7i4/0195.
Full textMeyer, Helen. "Bank restless with app-level security." Computers & Security 15, no. 3 (January 1996): 221. http://dx.doi.org/10.1016/0167-4048(96)90212-6.
Full textHurlburt, George, Jeffrey Voas, and Keith W. Miller. "Mobile-App Addiction: Threat to Security?" IT Professional 13, no. 6 (November 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.104.
Full textS.G, Tejashwini, Charitha B, Hemanjali V.T, Pavani C.S, and SwathiReddy D. "Hand-In-Hand -An Android Security App." International Journal of Engineering Trends and Technology 35, no. 6 (May 25, 2016): 247–49. http://dx.doi.org/10.14445/22315381/ijett-v35p253.
Full textCosta, Gabriele, Alessio Merlo, Luca Verderame, and Alessandro Armando. "Automatic security verification of mobile app configurations." Future Generation Computer Systems 80 (March 2018): 519–36. http://dx.doi.org/10.1016/j.future.2016.06.014.
Full textNEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.
Full textSankar, E., CH Aditya Karthik, and A. Sai Kiran. "Women Safety App." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1198–201. http://dx.doi.org/10.22214/ijraset.2022.40851.
Full textLai, Sen Tarng. "Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security." Applied Mechanics and Materials 182-183 (June 2012): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.2085.
Full textShan, Mei Jing. "Research on Data Security of Mobile Payment App." Applied Mechanics and Materials 511-512 (February 2014): 1201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1201.
Full textBang, Ji-Ho, Rhan Ha, Pil-Yong Kang, and Hong-Geun Kim. "Security Verification Framework for e-GOV Mobile App." Journal of Korea Information and Communications Society 37, no. 2C (February 29, 2012): 119–31. http://dx.doi.org/10.7840/kics.2012.37c.2.119.
Full textMeily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (March 18, 2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.
Full textThompson, Nick. "Putting security at the heart of app development." Network Security 2017, no. 11 (November 2017): 7–8. http://dx.doi.org/10.1016/s1353-4858(17)30093-4.
Full textMcGraw, Gary. "The New Killer App for Security: Software Inventory." Computer 51, no. 2 (February 2018): 60–62. http://dx.doi.org/10.1109/mc.2018.1451662.
Full textSakure, Kishore, Purva Pawale, Kamal Singh, Tanvi Khadakban, and Deepali Dongre. "Women Safety App." YMER Digital 21, no. 03 (April 24, 2022): 423–27. http://dx.doi.org/10.37896/ymer21.04/39.
Full textAljedaani, Bakheet, and M. Ali Babar. "Challenges With Developing Secure Mobile Health Applications: Systematic Review." JMIR mHealth and uHealth 9, no. 6 (June 21, 2021): e15654. http://dx.doi.org/10.2196/15654.
Full text彭, 建. "Quantum Channel Physical Security Detection Based on Photon Number Measurement." Applied Physics 07, no. 08 (2017): 235–46. http://dx.doi.org/10.12677/app.2017.78030.
Full textGelber, Alexander M., Damon Jones, Daniel W. Sacks, and Jae Song. "Using Nonlinear Budget Sets to Estimate Extensive Margin Responses: Method and Evidence from the Earnings Test." American Economic Journal: Applied Economics 13, no. 4 (October 1, 2021): 150–93. http://dx.doi.org/10.1257/app.20180811.
Full textChong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 796. http://dx.doi.org/10.1177/1541931213601691.
Full textAliyu, Mansur, Onyia Franklin Nonso, Anas Abdullahi, Umar Sani, and Zahriya L. Hassan. "Secure document and image transmission through an encrypted network system." Dutse Journal of Pure and Applied Sciences 8, no. 3b (October 14, 2022): 1–14. http://dx.doi.org/10.4314/dujopas.v8i3b.1.
Full textLeso, Martin. "ITS ON RAILWAY." Acta Polytechnica CTU Proceedings 11 (August 28, 2017): 39. http://dx.doi.org/10.14311/app.2017.11.0039.
Full textSyamsuddin, Irfan, Siska Ihdianty, Eddy Tungadi, Kasim Kasim, and Irawan Irawan. "XTEA CRYPTOGRAPHY IMPLEMENTATION IN ANDROID CHATTING APP." Journal of Information Technology and Its Utilization 3, no. 2 (December 22, 2020): 36. http://dx.doi.org/10.30818/jitu.3.2.3622.
Full textIm, Jung Nam, Jeong Kyung Kim, Hyun-Kyoon Kim, Kuen Yong Lee, and Won Ho Park. "Effect of tying conditions on the knot security of suture materials." Journal of Applied Polymer Science 109, no. 2 (2008): 918–22. http://dx.doi.org/10.1002/app.28109.
Full textIkhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (October 7, 2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.
Full textKwon, Young-Il, and Sam-Jin Jeong. "Implementation of Home Security System using a Mobile App." Convergence Society for SMB 7, no. 4 (August 31, 2017): 91–96. http://dx.doi.org/10.22156/cs4smb.2017.7.4.091.
Full textKennedy, Liam, and Madelaine Coelho. "Security, Suspicion, and Surveillance? There’s an App for That." Surveillance & Society 20, no. 2 (June 15, 2022): 127–41. http://dx.doi.org/10.24908/ss.v20i2.14536.
Full textV. Hima Bindu et al.,, V. Hima Bindu et al ,. "The Android App for Women's Security with Sms Alert." International Journal of Computer Science Engineering and Information Technology Research 11, no. 2 (2021): 65–70. http://dx.doi.org/10.24247/ijcseitrdec20219.
Full textTian, Ke, Gang Tan, Barbara G. Ryder, and Danfeng (Daphne) Yao. "Prioritizing data flows and sinks for app security transformation." Computers & Security 92 (May 2020): 101750. http://dx.doi.org/10.1016/j.cose.2020.101750.
Full textLiu, Hui, Juanru Li, and Dawu Gu. "Understanding the security of app-in-the-middle IoT." Computers & Security 97 (October 2020): 102000. http://dx.doi.org/10.1016/j.cose.2020.102000.
Full textLee, Seoung-Hyeon, Young-Hyuk Kim, Jae-Kwang Lee, and Deok Gyu Lee. "Hybrid app security protocol for high speed mobile communication." Journal of Supercomputing 72, no. 5 (November 7, 2014): 1715–39. http://dx.doi.org/10.1007/s11227-014-1318-3.
Full textChindawong, Chakkresit, and Diethelm Johannsmann. "An anisotropic ink based on crystalline nanocellulose: Potential applications in security printing." Journal of Applied Polymer Science 131, no. 22 (June 16, 2014): n/a. http://dx.doi.org/10.1002/app.41063.
Full textAlmubarak, Hameed, Mohamed Khairallah Khouja, and Ahmed Jedidi. "Security and privacy recommendation of mobile app for Arabic speaking." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5191. http://dx.doi.org/10.11591/ijece.v12i5.pp5191-5203.
Full textAkhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.
Full textSahu, Bharti, Ayushi Chandrakar, and Teshu Gaurav Singh. "Raksha: A Safety Alert App." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 648–52. http://dx.doi.org/10.22214/ijraset.2022.40334.
Full textSusmitha, E., and A. Mahendra. "Dark Knight Application using Android." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 578–90. http://dx.doi.org/10.22214/ijraset.2022.46152.
Full textKhandekar, Swapna, Jingyuan Liang, Abdul Razaque, Fathi Amsaad, and Musbah Abdulgader. "Security Research of a Social Payment App and Suggested Improvement." Communications on Applied Electronics 4, no. 5 (February 25, 2016): 14–21. http://dx.doi.org/10.5120/cae2016652059.
Full textZebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (May 25, 2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.
Full textSrinivasan, Satish M., and Raghvinder S. Sangwan. "Web App Security: A Comparison and Categorization of Testing Frameworks." IEEE Software 34, no. 1 (January 2017): 99–102. http://dx.doi.org/10.1109/ms.2017.21.
Full textHong, Sung Moon, Tae-Hyoung Choi, and Kyung-Goo Doh. "Automatic Detection of Security Weakness in Mobile-app Source Code." Journal of Security Engineering 14, no. 2 (April 30, 2017): 91–102. http://dx.doi.org/10.14257/jse.2017.04.04.
Full textSleep, Lyndal, and Kieran Tranter. "The Visiocracy of the Social Security Mobile App in Australia." International Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique 30, no. 3 (November 29, 2016): 495–514. http://dx.doi.org/10.1007/s11196-016-9498-1.
Full textSong, Weiqiong, Shuai Guo, Jiwei Li, Heng Liu, Zaijun Wu, Xiaorong He, and Yunyang Hou. "Security Authentication Framework Design for Electric Internet of Things." Journal of Physics: Conference Series 2356, no. 1 (October 1, 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.
Full textAkraman, Robbi, Candiwan Candiwan, and Yudi Priyadi. "Pengukuran Kesadaran Keamanan Informasi Dan Privasi Pada Pengguna Smartphone Android Di Indonesia." JURNAL SISTEM INFORMASI BISNIS 8, no. 2 (October 24, 2018): 1. http://dx.doi.org/10.21456/vol8iss2pp1-8.
Full textAkraman, Robbi, Candiwan Candiwan, and Yudi Priyadi. "Pengukuran Kesadaran Keamanan Informasi Dan Privasi Pada Pengguna Smartphone Android Di Indonesia." JURNAL SISTEM INFORMASI BISNIS 8, no. 2 (October 24, 2018): 115. http://dx.doi.org/10.21456/vol8iss2pp115-122.
Full textMunthe, Ibnu Rasyid, and Iwan Purnama. "UJI TINGKAT KESADARAN KEAMANAN INFORMASI PENGGUNA SMARTPHONE (STUDI KASUS: AMIK LABUHAN BATU)." Jurnal Teknik Informasi dan Komputer (Tekinkom) 2, no. 2 (December 30, 2019): 156. http://dx.doi.org/10.37600/tekinkom.v2i2.113.
Full textEl-Din, Nabil Mohamed Safy. "IR spectroscopic study on the thermal degradation of plastic security cover sheets of some documents." Journal of Applied Polymer Science 47, no. 5 (February 5, 1993): 911–16. http://dx.doi.org/10.1002/app.1993.070470518.
Full textBai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.
Full textWahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.
Full textDemissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (September 15, 2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.
Full textL. Calpito, Jomar, Paul L. Olanday, and Alain C. Gallarde. "Application of advanced encryption standard in the computer or handheld online year-round registration system." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 922. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp922-935.
Full textSanyal, Pallab, Nirup Menon, and Mikko Siponen. "An Empirical Examination of the Economics of Mobile Application Security." MIS Quarterly 45, no. 4 (December 1, 2021): 2235–60. http://dx.doi.org/10.25300/misq/2021/15315.
Full text