Filters








10,564 Hits in 5.6 sec

Is this app safe for children?

Ying Chen, Heng Xu, Yilu Zhou, Sencun Zhu
2013 Proceedings of the 22nd international conference on World Wide Web - WWW '13  
The maturity ratings of Android apps are provided purely by developers' self-disclosure and are rarely verified.  ...  There is a rising concern among parents who have experienced unreliable content maturity ratings for mobile applications (apps) that result in inappropriate risk exposure for their children and adolescents  ...  Any opinions, findings, and conclusions or recommendations expressed herein are those of the researchers and do not necessarily reflect the views of the U.S. National Science Foundation.  ... 
doi:10.1145/2488388.2488407 dblp:conf/www/ChenXZZ13 fatcat:lxdxtmdy7jhhrcbxzuon6gf3mi

An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective

Haoyu Wang, Zhe Liu, Yao Guo, Xiangqun Chen, Miao Zhang, Guoai Xu, Jason Hong
2017 Proceedings of the 26th International Conference on World Wide Web - WWW '17  
This paper presents a study of the mobile app ecosystem from the perspective of app developers.  ...  We also investigated the privacy behaviors of app developers, showing that some developers have a habit of producing apps with low privacy ratings.  ...  A comparison of the distribution of average app installs for different developer groups.  ... 
doi:10.1145/3038912.3052712 dblp:conf/www/WangLGCZXH17 fatcat:y7nzb6hj7fapfmfad5c54mmklq

Animation Effectiveness for E-Learning with Progressive Web App Approach: a Narrative Review

Hadi Wijaya, Rabab Alayham Abbas, . .
2018 International Journal of Engineering & Technology  
As a first step, the study of animation and e-learning development became the basis of this narrative literature.  ...  Understanding the content of a subject is the most fundamental thing a student should do to acquire the skills and knowledge. Animation is one way to provide an interesting way of learning.  ...  Acknowledgement This research was supported by School of Graduate Studies, Management and Science University, Malaysia.  ... 
doi:10.14419/ijet.v7i4.11.20785 fatcat:sk7v6hycu5hvhpch7dszoxtjki

A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps

Deepak Kumar Jain, Akshi Kumar, Saurabh Raj Sangwan, Gia Nhu Nguyen, Prayag Tiwari
2019 IEEE Access  
In this paper, an empirical study is conducted to classify faults in bug reports of three open-source web-apps (qaManager, bitWeaver, and WebCalendar) and reviews of two play store web-apps (Dineout: Reserve  ...  Classifying faults can intelligently enhance the quality of the web-apps by the assessment of probable faults.  ...  testing practitioners to seed similar types of faults for comprehending fault-based testing of Web-Apps.  ... 
doi:10.1109/access.2019.2894871 fatcat:72plppp2d5fr3dlnqxbbzcjvhm

Mobile-Web App to Self-Manage Low Back Pain: Randomized Controlled Trial

A Blair Irvine, Holly Russell, Michael Manocchia, David E Mino, Terri Cox Glassen, Rebecca Morgan, Jeff M Gau, Amelia J Birney, Dennis V Ary
2015 Journal of Medical Internet Research  
FitBack app.  ...  FitBack app.  ... 
doi:10.2196/jmir.3130 pmid:25565416 pmcid:PMC4296097 fatcat:mys43oqgbvgkfglg56frnyb4qq

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

Daegeon Kim, Do Hyung Gu, Huy Kang Kim, Clemente Galdi
2020 Security and Communication Networks  
In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular  ...  Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure.  ...  Acknowledgments e study was funded by Institute for Information and Communications Technology Promotion (Grant no. 2020-0-00374, Development of Security Primitives for Unmanned Vehicles).  ... 
doi:10.1155/2020/8869418 fatcat:sythsc6cmrfc3omddo6tlzacnu

Experimental Evaluation of Security Requirements Engineering Benefits

Jaouad Boutahar, Ilham Maskani, Souhaïl El
2018 International Journal of Advanced Computer Science and Applications  
The followed methodology was to develop two versions of the same web application, with and without using SRE, then comparing the level of security in each version by running different test tools.  ...  The subsequent results clearly support the benefits of the early use of SRE with a 38% security improvement in the secure version of the application.  ...  As a result, the secure version of the web app is built with embedded security measures against those vulnerabilities.  ... 
doi:10.14569/ijacsa.2018.091158 fatcat:twyge6x3y5egliju3i7w6rhfma

Conversational Code Analysis: The Future of Secure Coding [chapter]

Fitzroy Nembhard, Marco M. Carvalho
2021 Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]  
Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during  ...  We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results.  ...  Test the system and report results To integrate the Google Actions app with the local web app, Ngrok [39] was chosen as the tunneling tool.  ... 
doi:10.5772/intechopen.98362 fatcat:r4swii2t6jbuxeg7bdmsko76sy

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment [article]

Daegeon Kim and Do Hyung Gu and Huy Kang Kim
2020 arXiv   pre-print
In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular  ...  Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure.  ...  The service system category corresponds to apps and web servers, as well as a DMZ firewall.  ... 
arXiv:2009.12116v2 fatcat:m7ttls5icfdpppgwqf7gq7occa

Security Analysis of Cordova Applications in Google Play

Michiel Willocx, Jan Vossaert, Vincent Naessens
2017 Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17  
CCS CONCEPTS • Security and privacy → Web application security; Domain-specific security and privacy architectures;  ...  This paper gives a statistical overview of the adoption of Cordova security best practices and mechanisms in Cordova applications downloaded from the Google Play Store.  ...  For this test, a list of over 20 commonly used JavaScript Frameworks was compiled and searched for in the decompiled applications.  ... 
doi:10.1145/3098954.3103162 dblp:conf/IEEEares/WillocxVN17 fatcat:z6ym7skkxfcmdca5defvtwdxcm

Toward Engineering a Secure Android Ecosystem

Meng Xu, Chenxiong Qian, Sangho Lee, Taesoo Kim, Chengyu Song, Yang Ji, Ming-Wei Shih, Kangjie Lu, Cong Zheng, Ruian Duan, Yeongjin Jang, Byoungyoung Lee
2016 ACM Computing Surveys  
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things.  ...  Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem.  ...  AndroTest [Shauvik et al. 2015 ] provides a comprehensive summary and comparison of existing Android testing tools.  ... 
doi:10.1145/2963145 fatcat:d5vhxpdywrevvbh4as6vvt576q

Conversational Code Analysis: The Future of Secure Coding [article]

Fitzroy D. Nembhard, Marco M. Carvalho
2021 arXiv   pre-print
Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during  ...  We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results.  ...  Chose a vulnerable project Test the system and report results To integrate the Google Actions app with the local web app, Ngrok [38] was chosen as the tunneling tool.  ... 
arXiv:2105.03502v2 fatcat:xnfu6xaxb5dg7ezkqvmdoyvs4i

Secure MedRecord – Your Medical Record, in Your Pocket

Choi Kelvin, Julia Binti Juremi, Ma'en Tayseer Ekrayem Alrashd
2020 International Journal of Current Research and Review  
The authors are also grateful to authors / editors / publishers of all those articles, journals and books from where the literature for this article has been reviewed and discussed.  ...  Acknowledgement: Authors acknowledge the immense help received from the scholars whose articles are cited and included in references of this manuscript.  ...  Reminder apps are categorized into 3 types which are Simple Medication Reminders (SMR), Advanced Medication Reminders (AMR) and Medication Management Apps (MMA).  ... 
doi:10.31782/ijcrr.2020.121711 fatcat:25y3f7s6jja5zijybf5qwk7s3m

Android Security Development: SpywareDetection, Apps Secure Level and Data Encryption Improvement

Lim Wei Xian, Chan Shao, Yap Ming, Azween Abdullah, Mahadevan Supramaniam
2019 International Journal of Advanced Computer Science and Applications  
We present a method that uses manifest files to determine the presence of spyware and the security level of apps.  ...  Most Android users are unaware that their smartphones are as vulnerable as any computer, and that permission by Android users is an important part of maintaining the security of Android smartphones.  ...  Android Permission Groups The Android web area [4] shows that Android categorizes all of its permissions group by group.  ... 
doi:10.14569/ijacsa.2019.0100625 fatcat:ctodgjplxje67leisgc5aixxsu

Improving Smartphone Security and Reliability

IULIAN NEAMTIU, XUETAO WEI, MICHALIS FALOUTSOS, LORENZO GOMEZ, TANZIRUL AZIM, YONGJIAN HU, ZHIYONG SHAN
2017 Journal of Interconnection Networks (JOIN)  
Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious  ...  Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing.  ...  The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory  ... 
doi:10.1142/s0219265917400023 fatcat:yq7yda6d4ras7a75jr33mzm3la
« Previous Showing results 1 — 15 out of 10,564 results