To see the other types of publications on this topic, follow the link: App Security.

Journal articles on the topic 'App Security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'App Security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Kumar, Prashant, Naveen Chauhan, Narottam Chand, and Lalit K. Awasthi. "SF-APP." International Journal of Web Services Research 15, no. 2 (April 2018): 47–66. http://dx.doi.org/10.4018/ijwsr.2018040103.

Full text
Abstract:
Opportunistic networks are the special class of ad hoc networks where permanent link among the nodes are almost absent and communication occurs when an “opportunity” is found. The opportunistic networks have more diverse features than traditional ad hoc networks, like self-organized nature, intermittent connectivity, store-carry-forward routing mechanism, etc. All these features make opportunistic networks more prone to security threats. This article discusses security challenges and threats to opportunistic networks. Focusing on the specific security requirements of opportunistic networks, proposed is a secure framework for authentication and privacy preservation (SF-APP) for opportunistic networks. The proposed algorithm takes care of authentication, privacy preservation, and trust management. Within this article is a performed security analysis of SF-APP and simulation results show that the proposed framework is capable of fulfilling the security requirements of opportunistic networks.
APA, Harvard, Vancouver, ISO, and other styles
2

Khan, Sajid Nabi, and Ikhlaq Ul Firdous. "Review on Android App Security." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 4 (April 30, 2017): 225–28. http://dx.doi.org/10.23956/ijarcsse/v7i4/0195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Meyer, Helen. "Bank restless with app-level security." Computers & Security 15, no. 3 (January 1996): 221. http://dx.doi.org/10.1016/0167-4048(96)90212-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hurlburt, George, Jeffrey Voas, and Keith W. Miller. "Mobile-App Addiction: Threat to Security?" IT Professional 13, no. 6 (November 2011): 9–11. http://dx.doi.org/10.1109/mitp.2011.104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

S.G, Tejashwini, Charitha B, Hemanjali V.T, Pavani C.S, and SwathiReddy D. "Hand-In-Hand -An Android Security App." International Journal of Engineering Trends and Technology 35, no. 6 (May 25, 2016): 247–49. http://dx.doi.org/10.14445/22315381/ijett-v35p253.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Costa, Gabriele, Alessio Merlo, Luca Verderame, and Alessandro Armando. "Automatic security verification of mobile app configurations." Future Generation Computer Systems 80 (March 2018): 519–36. http://dx.doi.org/10.1016/j.future.2016.06.014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

NEAMTIU, IULIAN, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, and ZHIYONG SHAN. "Improving Smartphone Security and Reliability." Journal of Interconnection Networks 17, no. 01 (March 2017): 1740002. http://dx.doi.org/10.1142/s0219265917400023.

Full text
Abstract:
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. Software analysis has been successful in tackling many such concerns, albeit on other platforms, such as desktop and server. To fill this gap, he have developed infrastructural tools that permit a wide range of software analyses for the Android smartphone platform. Developing these tools has required surmounting many challenges unique to the smartphone platform: dealing with input non-determinism in sensor-oriented apps, non-standard control ow, low-overhead yet high-fidelity record-and-replay. Our tools can analyze substantial, widely-popular apps running directly on smartphones, and do not require access to the app’s source code. We will first present two tools (automated exploration, record-and-replay) that increase Android app reliability by allowing apps to be explored automatically, and bugs replayed or isolated. Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious apps; app profiling to summarize app behavior; and Moving Target Defense for thwarting attacks.
APA, Harvard, Vancouver, ISO, and other styles
8

Sankar, E., CH Aditya Karthik, and A. Sai Kiran. "Women Safety App." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 1198–201. http://dx.doi.org/10.22214/ijraset.2022.40851.

Full text
Abstract:
Abstract: In today’s world, people using smart phones have increased rapidly andhence, a smart phone can be used efficiently for private security or various protection purposes hence, a smart phone can be used efficiently for private security or various other protection purposes. The dangeous incidents that outraged the entire other protection purposes. The heinous incidents that outraged the entire nation have waken us to go for the safety issues. So we have created a app so that women can feel safe when they go outside. In The feature of this application is to send application is to send the message to the registered contacts continuously, i.e. sharing the message to the registered contacts continuously and sharing the live location. Continuous location tracking information helps to seek out the location, tracking information helps to find the location of the victim and can be rescued safely. Index Terms: Android Application, Women Safety, Java, protection
APA, Harvard, Vancouver, ISO, and other styles
9

Lai, Sen Tarng. "Corrective Maintenance Based Vulnerability Repair Procedure to Improve Web Application Security." Applied Mechanics and Materials 182-183 (June 2012): 2085–90. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.2085.

Full text
Abstract:
In the internet age, the high efficiency and high profit activities must incorporate with the internet. Web Application (Web App) is an important IT product in the internet age. However, the network intrusions and security vulnerabilities have continued to threaten the operation of Web App. Penetration Testing (PT) is a critical step to identify security vulnerabilities. However, PT can not provide specific and effective follow-up work. For this, combining corrective maintenance with Web App repair operation will be discussed in this paper. And based on corrective maintenance, proposes a Web App Secure Repair Procedures (WASRP). Applying WASRP, the misjudgment ratio of security vulnerabilities and defects can be reduced. And assist to repair the security vulnerabilities and defects, effectively and concretely enhance the Web App security.
APA, Harvard, Vancouver, ISO, and other styles
10

Shan, Mei Jing. "Research on Data Security of Mobile Payment App." Applied Mechanics and Materials 511-512 (February 2014): 1201–4. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.1201.

Full text
Abstract:
This paper studies Mobile Payment App from Mobile payment and Application. We analyze the data security risks hidden in this payment model. Give the corresponding solutions. Finally, look forward the research direction of Mobile Payment App security.
APA, Harvard, Vancouver, ISO, and other styles
11

Bang, Ji-Ho, Rhan Ha, Pil-Yong Kang, and Hong-Geun Kim. "Security Verification Framework for e-GOV Mobile App." Journal of Korea Information and Communications Society 37, no. 2C (February 29, 2012): 119–31. http://dx.doi.org/10.7840/kics.2012.37c.2.119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Meily, Meily. "XYZ Web App Information Security Management Risk Assessment." ACMIT Proceedings 1, no. 1 (March 18, 2014): 59–89. http://dx.doi.org/10.33555/acmit.v1i1.19.

Full text
Abstract:
Cloud computing is one of the strategic technology trends. It’s pay as you go characteristic and the fact that the service is provided via a broad network, such as a web browser is what makes cloud providers incentivised by profits by providing cloud services, and cloud customers are interested in the chance of eliminating costs that come with in-house service provision. Due to its infrastructure where cloud providers maintain everything cloud customers are wary and concerned about their data and system security. Hence this paper was tries to address and answer cloud customers’ concern on security by doing an overall risk analysis using ENISA framework and Commonwealth of Virginia risk assessment guide on XYZ Web App, an application provided by XYZ Company for the insurance industry that connects insurers, repairers, adjusters and other third parties for claim processing and policy creation. This paper answers all the concerns by resulting it in overall risk summaries, likelihood, impact and overall risk rating that later in used for recommendation to improve XYZ Web App security.
APA, Harvard, Vancouver, ISO, and other styles
13

Thompson, Nick. "Putting security at the heart of app development." Network Security 2017, no. 11 (November 2017): 7–8. http://dx.doi.org/10.1016/s1353-4858(17)30093-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

McGraw, Gary. "The New Killer App for Security: Software Inventory." Computer 51, no. 2 (February 2018): 60–62. http://dx.doi.org/10.1109/mc.2018.1451662.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Sakure, Kishore, Purva Pawale, Kamal Singh, Tanvi Khadakban, and Deepali Dongre. "Women Safety App." YMER Digital 21, no. 03 (April 24, 2022): 423–27. http://dx.doi.org/10.37896/ymer21.04/39.

Full text
Abstract:
The security of women is a critical issue faced by society. Crimes against women such as eve teasing, sexual assaults, domestic violence are increasing in number day by day. When it comes to security concerns, a smart phone can be one the easiest way of gaining help. This project strives to create an android app which can help to protect women in any situation she might face in her day-to-day life. We have created a simple Android application which comprises various safety measures which can be used by women with a few clicks on the screen, to get quick and easy access to help or to avoid and escape a harmful situation. It uses GPS location tracking to provide a simple and fast way for the registered contacts to know that the user is in trouble and for them to reach the user easily. It also provides safety features such as a voice recording which can help a woman or the police for identification or situational evidence , a siren to alert the public of any misbehavior, emergency helpline numbers which can be used to directly connect via call to emergency services according to the situation faced by women for their safety
APA, Harvard, Vancouver, ISO, and other styles
16

Aljedaani, Bakheet, and M. Ali Babar. "Challenges With Developing Secure Mobile Health Applications: Systematic Review." JMIR mHealth and uHealth 9, no. 6 (June 21, 2021): e15654. http://dx.doi.org/10.2196/15654.

Full text
Abstract:
Background Mobile health (mHealth) apps have gained significant popularity over the last few years due to their tremendous benefits, such as lowering health care costs and increasing patient awareness. However, the sensitivity of health care data makes the security of mHealth apps a serious concern. Poor security practices and lack of security knowledge on the developers’ side can cause several vulnerabilities in mHealth apps. Objective In this review paper, we aimed to identify and analyze the reported challenges concerning security that developers of mHealth apps face. Additionally, our study aimed to develop a conceptual framework with the challenges for developing secure apps faced by mHealth app development organizations. The knowledge of such challenges can help to reduce the risk of developing insecure mHealth apps. Methods We followed the systematic literature review method for this review. We selected studies that were published between January 2008 and October 2020 since the major app stores launched in 2008. We selected 32 primary studies using predefined criteria and used a thematic analysis method for analyzing the extracted data. Results Of the 1867 articles obtained, 32 were included in this review based on the predefined criteria. We identified 9 challenges that can affect the development of secure mHealth apps. These challenges include lack of security guidelines and regulations for developing secure mHealth apps (20/32, 63%), developers’ lack of knowledge and expertise for secure mHealth app development (18/32, 56%), lack of stakeholders’ involvement during mHealth app development (6/32, 19%), no/little developer attention towards the security of mHealth apps (5/32, 16%), lack of resources for developing a secure mHealth app (4/32, 13%), project constraints during the mHealth app development process (4/32, 13%), lack of security testing during mHealth app development (4/32, 13%), developers’ lack of motivation and ethical considerations (3/32, 9%), and lack of security experts’ engagement during mHealth app development (2/32, 6%). Based on our analysis, we have presented a conceptual framework that highlights the correlation between the identified challenges. Conclusions While mHealth app development organizations might overlook security, we conclude that our findings can help them to identify the weaknesses and improve their security practices. Similarly, mHealth app developers can identify the challenges they face to develop mHealth apps that do not pose security risks for users. Our review is a step towards providing insights into the development of secure mHealth apps. Our proposed conceptual framework can act as a practice guideline for practitioners to enhance secure mHealth app development.
APA, Harvard, Vancouver, ISO, and other styles
17

彭, 建. "Quantum Channel Physical Security Detection Based on Photon Number Measurement." Applied Physics 07, no. 08 (2017): 235–46. http://dx.doi.org/10.12677/app.2017.78030.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Gelber, Alexander M., Damon Jones, Daniel W. Sacks, and Jae Song. "Using Nonlinear Budget Sets to Estimate Extensive Margin Responses: Method and Evidence from the Earnings Test." American Economic Journal: Applied Economics 13, no. 4 (October 1, 2021): 150–93. http://dx.doi.org/10.1257/app.20180811.

Full text
Abstract:
We estimate the impact of the Social Security Annual Earnings Test (AET) on older workers’ employment. The AET reduces social security claimants’ current benefits in proportion to their earnings in excess of an exempt amount. Using a regression kink design and Social Security Administration data, we document that the discontinuous change in the benefit reduction rate at the exempt amount causes a corresponding change in the slope of the employment rate, suggesting that the extensive margin of labor supply is more sensitive to this policy than commonly thought. We develop a model and method that allow us to translate the behavioral responses into a lower bound estimate of 0.49 for the extensive margin elasticity, which implies more than a 1 percentage point increase in work in the absence of the AET. (JEL H55, J14, J22, J26, J31)
APA, Harvard, Vancouver, ISO, and other styles
19

Chong, Isis, Huangyi Ge, Ningui Li, and Robert W. Proctor. "Influence of Privacy Priming and Security Framing on Android App Selection." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 796. http://dx.doi.org/10.1177/1541931213601691.

Full text
Abstract:
Many users unknowingly grant mobile applications (apps) permission to access their personal information (Felt et al., 2012). This access is in part a result of the large number of permissions apps request and users’ difficulty in understanding the nature of these potentially harmful requests (Kelley et al., 2011; Liccardi et al., 2014). Laboratory studies have suggested that different approaches can be taken to curtail the likelihood of mobile users installing malicious apps. A large body of work investigating mobile app security agrees that it is indeed possible to get users to make safer and more knowledgeable decisions during the app selection process. Gates, Chen, Li, and Proctor (2014), for example, found that users made less risky decisions when they were presented with a summary risk or safety ranking that conveys the overall risk of an app. Most recently, the effects of priming manipulations have indicated that introducing an intervention before the app selection process begins may be just as effective (Rajivan & Camp, 2016). In the current study we combined the work that has been conducted on providing overall risk/safety information (Chen et al., 2014; Choe et al., 2013) with that focused on priming users with self-relevant privacy questions (Rajivan & Camp, 2016). We sought to determine whether the subjective privacy priming effect reported by Rajivan and Camp could be replicated and whether an objective priming condition (in which facts about what information apps can access were presented) would have a similar or possibly even stronger effect. Another concern was how these priming conditions would interact with positively- vs, negatively-framed safety rankings (safety and risk scores, respectively). Participants were recruited through Amazon Mechanical Turk (MTurk). Participants were presented with subjective or objective safety items before the app-selection task and with apps and their respective safety rankings during the selection process. Subjective priming was induced with the eight subjective items used by Rajivan and Camp (2016), whereas objective priming was by way of app-permission examples modified from Harbach, Hettig, Weber, and Smith (2014). In the control condition, participants completed the task without any priming material, similar to the study by Chen et al. (2015). Also, summary safety and risk rankings were varied for the app-selection task, as in Chen et al.’s (2015) study. The procedure closely followed that of Chen et al. (2015). Participants were provided with a demonstration of the elements of the apps they would be selecting. Each app was displayed with several pieces of information including the app icon, app name, developer, user rating (out of five stars), user rating count, permission safety or risk ranking (out of five circles), and a brief description of the app. The distributions of user ratings and permission safety/risk rankings were identical to those used by Chen et al. (2015). For the safety framing condition, a higher safety ranking indicated a safer app, whereas for the negative framing condition, a higher risk ranking indicated a riskier app. Participants were instructed to pick two out of the six apps for six groups of apps. We were able to replicate the findings of Chen et al. (2015), showing a greater impact from summary scores framed as safety rather than risk. The data suggest that participants were more sensitive to the safety rankings when higher rankings indicated low vs. high safety than low vs. high risk. We also replicated the findings of Rajivan and Camp (2016) in which subjective priming of security enhances participants’ consideration of the safety rankings. Moreover, we obtained evidence that objective priming with specific app permissions yields a similar benefit. Since priming with either kind of safety-relevant items resulted in safer app selections than a control condition without priming, we conclude that the benefit of priming is primarily due to the general activation of security and privacy as part of the task set. In sum, this study supports the notion that a multi-pronged approach where safety-related information is presented before the app selection process and a summary safety index is displayed may be the most effective way to improve users’ safety behaviors.
APA, Harvard, Vancouver, ISO, and other styles
20

Aliyu, Mansur, Onyia Franklin Nonso, Anas Abdullahi, Umar Sani, and Zahriya L. Hassan. "Secure document and image transmission through an encrypted network system." Dutse Journal of Pure and Applied Sciences 8, no. 3b (October 14, 2022): 1–14. http://dx.doi.org/10.4314/dujopas.v8i3b.1.

Full text
Abstract:
Data communication and networks as a field gives high priority to data and network security. Presently, internet security issues have become very critical in sharing information. Perhaps, there is need for robust techniques for the protection of data shared via unsecured network channels. Since cryptography is a technique for securing plain text messages such as encrypted key exchange and authentication but reveals when and where communication is taking place, while steganography hides the existence of data to be transmitted. Thus, there is need for a tool that combines these two techniques in a single data transmission. As such, this paper intends to develop an application that combines both features of cryptography and steganography techniques for secure communication. The application is a cross-platform tool that can effectively hide information in many different carrier file formats such as image, audio or digital video file. The study adopt the requirements of Advanced Encryption Standard (AES) and Least Significant Bit (LSB) algorithm in order to come up with best technique that is more robust in securing confidential documents and images. The developed App accepts different file formats when hiding plaintext, messages, and images. The App is recommended to government security agencies, financial institutions, e-commerce websites/app, educational bodies, and individuals in sending personal data online.
APA, Harvard, Vancouver, ISO, and other styles
21

Leso, Martin. "ITS ON RAILWAY." Acta Polytechnica CTU Proceedings 11 (August 28, 2017): 39. http://dx.doi.org/10.14311/app.2017.11.0039.

Full text
Abstract:
Development of technology management and security, transmission and information systems allows the concept of process management and security of railways and organizing the operation of a new, as yet non-phase in a non-traditional way. Requirements for higher efficiency, accuracy and flexibility of the attractiveness of rail transport Connection in the integrated transport systems are a challenge for the railways. These requirements can be solved just by changing the concept and technology of the presented here as an ITS-R.
APA, Harvard, Vancouver, ISO, and other styles
22

Syamsuddin, Irfan, Siska Ihdianty, Eddy Tungadi, Kasim Kasim, and Irawan Irawan. "XTEA CRYPTOGRAPHY IMPLEMENTATION IN ANDROID CHATTING APP." Journal of Information Technology and Its Utilization 3, no. 2 (December 22, 2020): 36. http://dx.doi.org/10.30818/jitu.3.2.3622.

Full text
Abstract:
Information security plays a significant role in information society. Cryptography is a key proof of concept to increasing the security of information assets and has been deployed in various algorithms. Among cryptography algorithms is Extended Tiny Encryption Algorithm. This study aims to describe a recent Android Apps to realize XTEA Cryptography in mobile form. In addition, a thorough example is presented to enable readers gain understanding on how it works within our Android Apps.
APA, Harvard, Vancouver, ISO, and other styles
23

Im, Jung Nam, Jeong Kyung Kim, Hyun-Kyoon Kim, Kuen Yong Lee, and Won Ho Park. "Effect of tying conditions on the knot security of suture materials." Journal of Applied Polymer Science 109, no. 2 (2008): 918–22. http://dx.doi.org/10.1002/app.28109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Ikhalia, Ehinome, Alan Serrano, David Bell, and Panos Louvieris. "Online social network security awareness: mass interpersonal persuasion using a Facebook app." Information Technology & People 32, no. 5 (October 7, 2019): 1276–300. http://dx.doi.org/10.1108/itp-06-2018-0278.

Full text
Abstract:
Purpose Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC). Design/methodology/approach The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself. Findings Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs. Research limitations/implications The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions. Practical implications SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos. Social implications The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness. Originality/value Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
APA, Harvard, Vancouver, ISO, and other styles
25

Kwon, Young-Il, and Sam-Jin Jeong. "Implementation of Home Security System using a Mobile App." Convergence Society for SMB 7, no. 4 (August 31, 2017): 91–96. http://dx.doi.org/10.22156/cs4smb.2017.7.4.091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Kennedy, Liam, and Madelaine Coelho. "Security, Suspicion, and Surveillance? There’s an App for That." Surveillance & Society 20, no. 2 (June 15, 2022): 127–41. http://dx.doi.org/10.24908/ss.v20i2.14536.

Full text
Abstract:
Despite the recent rise in popularity of mobile safety applications, social scientists have yet to examine these applications in any considerable depth. In this paper we undertake the case studies of bSafe, Citizen, and Nextdoor – analyzing promotional materials and blog posts – in order to further theorize digital security consumption and the potential concomitant social harms. We find these app companies frame crime and risk in ways that obscure the structural elements that precede crime and encourage social divisions. Drawing from over 30,000 user reviews, we speculate about the ways these apps might shape understandings, feelings, and experiences of risk, crime, and victimization. A closer examination of these apps is particularly urgent given these digital technologies have been mobilized in similar ways to respond to the COVID-19 pandemic.
APA, Harvard, Vancouver, ISO, and other styles
27

V. Hima Bindu et al.,, V. Hima Bindu et al ,. "The Android App for Women's Security with Sms Alert." International Journal of Computer Science Engineering and Information Technology Research 11, no. 2 (2021): 65–70. http://dx.doi.org/10.24247/ijcseitrdec20219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tian, Ke, Gang Tan, Barbara G. Ryder, and Danfeng (Daphne) Yao. "Prioritizing data flows and sinks for app security transformation." Computers & Security 92 (May 2020): 101750. http://dx.doi.org/10.1016/j.cose.2020.101750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Liu, Hui, Juanru Li, and Dawu Gu. "Understanding the security of app-in-the-middle IoT." Computers & Security 97 (October 2020): 102000. http://dx.doi.org/10.1016/j.cose.2020.102000.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lee, Seoung-Hyeon, Young-Hyuk Kim, Jae-Kwang Lee, and Deok Gyu Lee. "Hybrid app security protocol for high speed mobile communication." Journal of Supercomputing 72, no. 5 (November 7, 2014): 1715–39. http://dx.doi.org/10.1007/s11227-014-1318-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chindawong, Chakkresit, and Diethelm Johannsmann. "An anisotropic ink based on crystalline nanocellulose: Potential applications in security printing." Journal of Applied Polymer Science 131, no. 22 (June 16, 2014): n/a. http://dx.doi.org/10.1002/app.41063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Almubarak, Hameed, Mohamed Khairallah Khouja, and Ahmed Jedidi. "Security and privacy recommendation of mobile app for Arabic speaking." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 5 (October 1, 2022): 5191. http://dx.doi.org/10.11591/ijece.v12i5.pp5191-5203.

Full text
Abstract:
<p>There is an enormous number of mobile apps, leading users to be concerned about the security and privacy of their data. But few users are aware of what is meant by app permissions, which sometimes do not illustrate what kind of data is gathered. Therefore, users are still concerned about security risks and privacy, with little knowledge and experience of what security and privacy awareness. Users depend on ratings, which may be fake, or keep track of their sense to install an app, and an enormous number of users do not like to read reviews. To solve this issue, we propose a recommender system that reads users' reviews, and which exposes flaws, violations and third-party policies or the quality of a user's experience. In order to design and implement our recommender, we conduct a survey which supports two significant points: to detect the level of security and privacy awareness between users, and to gather new words into a dictionary of a recommender system, which assists to classify each review on the correct level, which can indeed reveal the scale of security and privacy in an app.</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Akhriana, Asmah, and Andi Irmayana. "WEB APP PENDETEKSI JENIS SERANGAN JARINGAN KOMPUTER DENGAN MEMANFAATKAN SNORT DAN LOG HONEYPOT." CCIT Journal 12, no. 1 (February 6, 2019): 85–96. http://dx.doi.org/10.33050/ccit.v12i1.604.

Full text
Abstract:
Along with the current development of Information Technology is always changing to make the security of an information is very important, especially on a network connected to the internet. But what is unfortunate is that the imbalance between each development of a technology is not accompanied by developments in the security system itself, so that there are quite a lot of systems that are still weak and have to be increased by the security wall. This study aims to design a Web-based App interface to facilitate users or administrators in securing network computers from various types of attacks. The Instrusion detection system (IDS) method is used to detect suspicious activity in a system or network using snort and honeypot. Honeypot is built on a computer along with Apache, MySQL, and Snort. Honeypot will act as a target to attract attackers and log information from the attacker and snort to apply the rules made from the web. The functional system will then be tested using the black box testing method. The results of this study concluded that Web App-based interfaces that are created can be used to help users and administrators in maintaining data and information on server computers from various types of attacks on computer networks
APA, Harvard, Vancouver, ISO, and other styles
34

Sahu, Bharti, Ayushi Chandrakar, and Teshu Gaurav Singh. "Raksha: A Safety Alert App." International Journal for Research in Applied Science and Engineering Technology 10, no. 2 (February 28, 2022): 648–52. http://dx.doi.org/10.22214/ijraset.2022.40334.

Full text
Abstract:
Abstract: In this modern's time, it will hazardous to travel alone for a person at night especially for women. To providesafety and reduce the chance of becoming victim of violent crime it is necessary to have an app which safe for you, it is identify and call on resources to help you out from unsafe situations. In today's time, people using smart phones hasrapidly increased, a smart phone is essential need of everyone in today's time,so smart phone can be used efficiently for individual security or various another defense. The terrible incident that heated the entire nation have wake up us to go for the safety issues and so, host new appshave been developed to provide security systems to women via their phones. This android application is for the safety of the people and this app can be activated by the single click, whenever need is arising. A single click will identify the location of the place through the GPS system andsend SMS to the registered contact. Raksha, A Safety Alert App have aunique feature, in this application the SMS is send to all the five contact whichis registered in this application. Continuous location tracking is also added in this application. It has anambulance call and police call feature andalso have a women helpline number.
APA, Harvard, Vancouver, ISO, and other styles
35

Susmitha, E., and A. Mahendra. "Dark Knight Application using Android." International Journal for Research in Applied Science and Engineering Technology 10, no. 8 (August 31, 2022): 578–90. http://dx.doi.org/10.22214/ijraset.2022.46152.

Full text
Abstract:
Abstract: This paper providing an Android App, which makes easier for traveler to travel to their destination. The need for security and safety is of high demand today. Especially for women, It is required to provide an assurance they are being protected. This app provides this need and assurance. It makes use of Firebase phone authentication which helps us to get authenticated with minimum effort. It privies a Location update service that allows the guardians know about the where about of the ward. It also contains a chat box in which we can dynamically update our location by sending messages to our guardians. Finally this security app is a nice watcher of our loved ones and ensures of their security and safety.
APA, Harvard, Vancouver, ISO, and other styles
36

Khandekar, Swapna, Jingyuan Liang, Abdul Razaque, Fathi Amsaad, and Musbah Abdulgader. "Security Research of a Social Payment App and Suggested Improvement." Communications on Applied Electronics 4, no. 5 (February 25, 2016): 14–21. http://dx.doi.org/10.5120/cae2016652059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zebua, Taronisokhi, Rivalry Kristianto Hondro, and Eferoni Ndruru. "Message Security on Chat App based on Massey Omura Algorithm." IJISTECH (International Journal Of Information System & Technology) 1, no. 2 (May 25, 2018): 16. http://dx.doi.org/10.30645/ijistech.v1i2.11.

Full text
Abstract:
Security of message on chat apps is very important to do so that messages that distributed always safety for others who do not have access permission. However, not all chat apps currently have tools that used to secure messages. This is still often overlooked, thus providing an easy space for the attackers to hack messages that are distributed. This research explains the usage of the massey-omura algorithm to secure text type message in chat apps when message distributed
APA, Harvard, Vancouver, ISO, and other styles
38

Srinivasan, Satish M., and Raghvinder S. Sangwan. "Web App Security: A Comparison and Categorization of Testing Frameworks." IEEE Software 34, no. 1 (January 2017): 99–102. http://dx.doi.org/10.1109/ms.2017.21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Hong, Sung Moon, Tae-Hyoung Choi, and Kyung-Goo Doh. "Automatic Detection of Security Weakness in Mobile-app Source Code." Journal of Security Engineering 14, no. 2 (April 30, 2017): 91–102. http://dx.doi.org/10.14257/jse.2017.04.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sleep, Lyndal, and Kieran Tranter. "The Visiocracy of the Social Security Mobile App in Australia." International Journal for the Semiotics of Law - Revue internationale de Sémiotique juridique 30, no. 3 (November 29, 2016): 495–514. http://dx.doi.org/10.1007/s11196-016-9498-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Song, Weiqiong, Shuai Guo, Jiwei Li, Heng Liu, Zaijun Wu, Xiaorong He, and Yunyang Hou. "Security Authentication Framework Design for Electric Internet of Things." Journal of Physics: Conference Series 2356, no. 1 (October 1, 2022): 012003. http://dx.doi.org/10.1088/1742-6596/2356/1/012003.

Full text
Abstract:
The intelligent terminal equipment of the electric internet of things (IoT) is vulnerable to network attacks when installing APPs from the application store. Encryption of the communication process can enhance security protection, but the key needs to be stored in the local equipment. When the equipment is attacked, the key is leaked easily resulting in communication security problems. To solve the above problems, we proposes a terminal APP security authentication mechanism based on TrustZone approach and OP-TEE (Open Source Trust Execution Environment) system to identify the identity information of both sides of the communication. The digital certificate of the application store is checked before the terminal equipment installs the APP. After the check is passed, the session key is generated in the Trusted Execution Environment (TEE), and the communication parties use the session key to encrypt the subsequent process. Simulation results validate that the proposed security authentication mechanism can effectively protect the communication process of terminal equipment installation APP and meet the performance requirements.
APA, Harvard, Vancouver, ISO, and other styles
42

Akraman, Robbi, Candiwan Candiwan, and Yudi Priyadi. "Pengukuran Kesadaran Keamanan Informasi Dan Privasi Pada Pengguna Smartphone Android Di Indonesia." JURNAL SISTEM INFORMASI BISNIS 8, no. 2 (October 24, 2018): 1. http://dx.doi.org/10.21456/vol8iss2pp1-8.

Full text
Abstract:
Based on statistical data, it is known that Android is the most popular smartphone with the largest number of users in the world, which is about 1.8 billion users. The high number of users also invite the many cases of information security and privacy caused by the lack of awareness of the user such as : spam, spoofing/phising, network incident, malware, uploading something personal data such as photos, phone numbers, addresses or having no antivirus. This study aims to find out about the awareness of the security of information and privacy of Android smartphone users by doing measurement of problem. The awareness has some dimensions such as attitude, knowledge and behavior with the seven focus areas of information security namely trust in app repository, misconception about app testing, security and agreement message, pirated application, adoption Security control, spam sms and report of security incidents and three focus areas of privacy are perceived surveillance, perceived intrusion, secondary use of information. This research uses analytical hierarchy process (AHP) to measure the level of awareness of information security and privacy of smartphone users. Overall, the results of the research show that information security has an average level of awareness (71%) but the focus area of report for security incidents has a poor level of awareness (37%) this occur because users prefer to solve their own information security issues experienced and privacy has an average level of awareness (76%). However, for secondary use of information in attitude dimension has low awareness level (66%). Based on the results of this study, it can be concluded that smartphone users in Indonesia have a poor awareness level in maintaining security and privacy of their information.
APA, Harvard, Vancouver, ISO, and other styles
43

Akraman, Robbi, Candiwan Candiwan, and Yudi Priyadi. "Pengukuran Kesadaran Keamanan Informasi Dan Privasi Pada Pengguna Smartphone Android Di Indonesia." JURNAL SISTEM INFORMASI BISNIS 8, no. 2 (October 24, 2018): 115. http://dx.doi.org/10.21456/vol8iss2pp115-122.

Full text
Abstract:
Based on statistical data, it is known that Android is the most popular smartphone with the largest number of users in the world, which is about 1.8 billion users. The high number of users also invite the many cases of information security and privacy caused by the lack of awareness of the user such as : spam, spoofing/phising, network incident, malware, uploading something personal data such as photos, phone numbers, addresses or having no antivirus. This study aims to find out about the awareness of the security of information and privacy of Android smartphone users by doing measurement of problem. The awareness has some dimensions such as attitude, knowledge and behavior with the seven focus areas of information security namely trust in app repository, misconception about app testing, security and agreement message, pirated application, adoption Security control, spam sms and report of security incidents and three focus areas of privacy are perceived surveillance, perceived intrusion, secondary use of information. This research uses analytical hierarchy process (AHP) to measure the level of awareness of information security and privacy of smartphone users. Overall, the results of the research show that information security has an average level of awareness (71%) but the focus area of report for security incidents has a poor level of awareness (37%) this occur because users prefer to solve their own information security issues experienced and privacy has an average level of awareness (76%). However, for secondary use of information in attitude dimension has low awareness level (66%). Based on the results of this study, it can be concluded that smartphone users in Indonesia have a poor awareness level in maintaining security and privacy of their information.
APA, Harvard, Vancouver, ISO, and other styles
44

Munthe, Ibnu Rasyid, and Iwan Purnama. "UJI TINGKAT KESADARAN KEAMANAN INFORMASI PENGGUNA SMARTPHONE (STUDI KASUS: AMIK LABUHAN BATU)." Jurnal Teknik Informasi dan Komputer (Tekinkom) 2, no. 2 (December 30, 2019): 156. http://dx.doi.org/10.37600/tekinkom.v2i2.113.

Full text
Abstract:
Based on statistical data, it is known that Android is the most popular smartphone with the largest number of users in the world, which is around 1.8 billion users. The high number of users also invites many cases of information security and privacy caused by a lack of awareness from users such as spam, spoofing / phishing, network incidents, malware, uploading something of a personal nature such as photos, telephone numbers, addresses or not having antivirus. This study aims to find out about information security and privacy of Android smartphone users by measuring the problem of the dimension of awareness (attitude, knowledge and behavior) with seven focus areas of information security namely trust in app repositories, misconception about app testing, security and agreement messages, pirated application, adoption of security control, spam sms and report of security incidents and three focus areas on privacy namely perceived surveillance, perceived intrusion, secondary use of information. This research uses analytical hierarchy process (AHP) method to measure the level of information security awareness and privacy of smartphone users. Overall, the results of the study indicate that information security has an average level of awareness (71%). But in the focus area the report for security incidents has a poor level of awareness (37%) this is because users prefer to solve their own information security problems experienced and privacy has an average level of awareness (76%). While the secondary use of information in the attitude dimension has a low level of awareness (66%). Based on these findings, it can be concluded that smartphone users at AMIK Labuhan Batu have a poor level of awareness in maintaining information security and privacy..
APA, Harvard, Vancouver, ISO, and other styles
45

El-Din, Nabil Mohamed Safy. "IR spectroscopic study on the thermal degradation of plastic security cover sheets of some documents." Journal of Applied Polymer Science 47, no. 5 (February 5, 1993): 911–16. http://dx.doi.org/10.1002/app.1993.070470518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Bai, Jian, Zhuo Zhang, and Bingshen Shen. "Internet of vehicles security situation awareness based on intrusion detection protection systems." Journal of Computational Methods in Sciences and Engineering 22, no. 1 (January 26, 2022): 189–95. http://dx.doi.org/10.3233/jcm-215889.

Full text
Abstract:
With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.
APA, Harvard, Vancouver, ISO, and other styles
47

Wahsheh, Heider A. M., and Flaminia L. Luccio. "Security and Privacy of QR Code Applications: A Comprehensive Study, General Guidelines and Solutions." Information 11, no. 4 (April 16, 2020): 217. http://dx.doi.org/10.3390/info11040217.

Full text
Abstract:
The widespread use of smartphones is boosting the market take-up of dedicated applications and among them, barcode scanning applications. Several barcodes scanners are available but show security and privacy weaknesses. In this paper, we provide a comprehensive security and privacy analysis of 100 barcode scanner applications. According to our analysis, there are some apps that provide security services including checking URLs and adopting cryptographic solutions, and other apps that guarantee user privacy by supporting least privilege permission lists. However, there are also apps that deceive the users by providing security and privacy protections that are weaker than what is claimed. We analyzed 100 barcode scanner applications and we categorized them based on the real security features they provide, or on their popularity. From the analysis, we extracted a set of recommendations that developers should follow in order to build usable, secure and privacy-friendly barcode scanning applications. Based on them, we also implemented BarSec Droid, a proof of concept Android application for barcode scanning. We then conducted a user experience test on our app and we compared it with DroidLa, the most popular/secure QR code reader app. The results show that our app has nice features, such as ease of use, provides security trust, is effective and efficient.
APA, Harvard, Vancouver, ISO, and other styles
48

Demissie, Biniam Fisseha, Mariano Ceccato, and Lwin Khin Shar. "Security analysis of permission re-delegation vulnerabilities in Android apps." Empirical Software Engineering 25, no. 6 (September 15, 2020): 5084–136. http://dx.doi.org/10.1007/s10664-020-09879-8.

Full text
Abstract:
Abstract The Android platform facilitates reuse of app functionalities by allowing an app to request an action from another app through inter-process communication mechanism. This feature is one of the reasons for the popularity of Android, but it also poses security risks to the end users because malicious, unprivileged apps could exploit this feature to make privileged apps perform privileged actions on behalf of them. In this paper, we investigate the hybrid use of program analysis, genetic algorithm based test generation, natural language processing, machine learning techniques for precise detection of permission re-delegation vulnerabilities in Android apps. Our approach first groups a large set of benign and non-vulnerable apps into different clusters, based on their similarities in terms of functional descriptions. It then generates permission re-delegation model for each cluster, which characterizes common permission re-delegation behaviors of the apps in the cluster. Given an app under test, our approach checks whether it has permission re-delegation behaviors that deviate from the model of the cluster it belongs to. If that is the case, it generates test cases to detect the vulnerabilities. We evaluated the vulnerability detection capability of our approach based on 1,258 official apps and 20 mutated apps. Our approach achieved 81.8% recall and 100% precision. We also compared our approach with two static analysis-based approaches — Covert and IccTA — based on 595 open source apps. Our approach detected 30 vulnerable apps whereas Covert detected one of them and IccTA did not detect any. Executable proof-of-concept attacks generated by our approach were reported to the corresponding app developers.
APA, Harvard, Vancouver, ISO, and other styles
49

L. Calpito, Jomar, Paul L. Olanday, and Alain C. Gallarde. "Application of advanced encryption standard in the computer or handheld online year-round registration system." Indonesian Journal of Electrical Engineering and Computer Science 27, no. 2 (August 1, 2022): 922. http://dx.doi.org/10.11591/ijeecs.v27.i2.pp922-935.

Full text
Abstract:
<span lang="EN-US">With various severe security threats for web applications, ensuring security on the database layer itself is imperative. Hence, this study aims to protect data saved on the computer or handheld online year-round (CHOY) registration system using the advanced encryption standard (AES) to strengthen data security within the app so that even potential attackers gain access to the app's database; they cannot obtain valuable information because it is scrambled and unreadable. The proponents based the study's conceptual framework on the symmetric and asymmetric key algorithms and procedures manual on enrollment of Southern Isabela College of arts and trades (SICAT) and ISO 25010. The study consists of three elements: developing the CHOY web app imbued with AES, testing it in terms of online registration and spam prevention, and evaluating it using the ISO 25010 in terms of compatibility, reliability, and security. The evaluation results show that implementing the AES in the CHOY web app meets the ISO 25010 criteria mentioned above.</span>
APA, Harvard, Vancouver, ISO, and other styles
50

Sanyal, Pallab, Nirup Menon, and Mikko Siponen. "An Empirical Examination of the Economics of Mobile Application Security." MIS Quarterly 45, no. 4 (December 1, 2021): 2235–60. http://dx.doi.org/10.25300/misq/2021/15315.

Full text
Abstract:
The growth of mobile devices coupled with advances in mobile technologies has resulted in the development and widespread use of a variety of mobile applications (apps). Mobile apps have been developed for social networking, banking, receiving daily news, maintaining fitness, and job-related tasks. The security of apps is an important concern. However, in some cases, app developers may be less interested in investing in the security of apps, if users are unwilling to pay for the added security. In this paper, we empirically examine whether consumers are less willing to pay for security features than for usability features. In addition, we examine whether a third-party certification of security features makes customers more willing to pay for security. Furthermore, we investigate the impact of risk perceptions on the willingness to pay for security. To explore these issues, we conducted a scenario-based experiment on mobile app users. Results from our analyses show that consumers are indeed less likely to pay for security features than usability features. However, the likelihood of paying for security features can be significantly increased by third-party certification of the features. Based on our analysis, we offer insights to producers of mobile apps to monetize the enhanced security features of their apps.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography