ArticleDetection of Integrity Attacks on Permissions of Android-Based Mobile Apps: Security Evaluation on PayPal
ArticleDetection of Integrity Attacks on Permissions of Android-Based Mobile Apps: Security Evaluation on PayPal
ArticleA SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS
ArticleA SURVEY ON SMARTPHONE PROTECTING IDENTIFICATION AGAINST ATTACKS USING BIOMETRIC AUTHENTICATION SYSTEMS
ArticleUsing Machine Learning to Identify Android Malware Relying on API calling sequences and Permissions
ArticleUsing Machine Learning to Identify Android Malware Relying on API calling sequences and Permissions
ArticlePerformance Analysis of Self-Healing Cluster Controlled Mobility Scheme for Data Security in UWSNs based on Proactive and Reactive Peers
ArticlePerformance Analysis of Self-Healing Cluster Controlled Mobility Scheme for Data Security in UWSNs based on Proactive and Reactive Peers
ArticleDTSRS: A Dynamic Trusted Set based Reputation System for Mobile Participatory Sensing Applications
ArticleDTSRS: A Dynamic Trusted Set based Reputation System for Mobile Participatory Sensing Applications