Dutta et al., 2019 - Google Patents
A Detailed Analysis of Data Security Issues in Android DevicesDutta et al., 2019
- Document ID
- 14507491074605911456
- Author
- Dutta D
- Agarwal S
- Dash R
- Sahoo B
- Publication year
- Publication venue
- International Conference on Intelligent Data Communication Technologies and Internet of Things
External Links
Snippet
People believe that any sufficiently advanced technology is indistinguishable from magic. The ability to analyze and act on data is increasingly gaining importance in this ever- expanding world. Data forms an integral part of the identity of an individual or an …
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11244070B2 (en) | Adaptive remediation of multivariate risk | |
Chitkara et al. | Does this app really need my location? Context-aware privacy management for smartphones | |
US10986122B2 (en) | Identifying and remediating phishing security weaknesses | |
Mylonas et al. | Assessing privacy risks in android: A user-centric approach | |
Beresford et al. | Mockdroid: trading privacy for application functionality on smartphones | |
Kiran Kumar et al. | A novel implementation of Linux based android platform for client and server | |
US10028139B2 (en) | Leveraging mobile devices to enforce restricted area security | |
Barati et al. | Enhancing user privacy in IoT: Integration of GDPR and blockchain | |
Harkin et al. | Operating-system design and its implications for victims of family violence: the comparative threat of smart phone spyware for Android versus iPhone users | |
Lee et al. | Protecting data on android platform against privilege escalation attack | |
Palanisamy et al. | Users’ attitude on perceived security of enterprise systems mobility: an empirical study | |
Meshram et al. | A survey paper on vulnerabilities in android OS and security of android devices | |
Orjiude et al. | A multilateral privacy impact analysis method for android applications | |
Farzand et al. | A systematic deconstruction of human-centric privacy & security threats on mobile phones | |
Calderwood et al. | Smartphone cyber security awareness in developing countries: A case of Thailand | |
Salman et al. | Securing mobile systems gps and camera functions using trustzone framework | |
Kadhim et al. | Security approach for instant messaging applications: viber as a case study | |
Biswas et al. | 3P framework: Customizable permission architecture for mobile applications | |
Dutta et al. | A Detailed Analysis of Data Security Issues in Android Devices | |
Helbing | Big data, privacy, and trusted web: What needs to be done | |
Basarudin et al. | Smart home user's information in cloud system: A comparison between Malaysian personal data protection act 2010 and EU general data protection regulation | |
Rajadorai et al. | Data Protection and Data Privacy Act for BIG DATA Governance | |
Haggerty et al. | Hobson’s choice: security and privacy permissions in Android and iOS devices | |
Monogios et al. | Privacy issues in Android applications: The cases of GPS navigators and fitness trackers | |
Jayakumar et al. | A review and survey on smartphones: The closest enemy to privacy |