A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Is this app safe for children?
2013
Proceedings of the 22nd international conference on World Wide Web - WWW '13
The maturity ratings of Android apps are provided purely by developers' self-disclosure and are rarely verified. ...
There is a rising concern among parents who have experienced unreliable content maturity ratings for mobile applications (apps) that result in inappropriate risk exposure for their children and adolescents ...
Any opinions, findings, and conclusions or recommendations expressed herein are those of the researchers and do not necessarily reflect the views of the U.S. National Science Foundation. ...
doi:10.1145/2488388.2488407
dblp:conf/www/ChenXZZ13
fatcat:lxdxtmdy7jhhrcbxzuon6gf3mi
An Explorative Study of the Mobile App Ecosystem from App Developers' Perspective
2017
Proceedings of the 26th International Conference on World Wide Web - WWW '17
This paper presents a study of the mobile app ecosystem from the perspective of app developers. ...
We also investigated the privacy behaviors of app developers, showing that some developers have a habit of producing apps with low privacy ratings. ...
A comparison of the distribution of average app installs for different developer groups. ...
doi:10.1145/3038912.3052712
dblp:conf/www/WangLGCZXH17
fatcat:y7nzb6hj7fapfmfad5c54mmklq
Animation Effectiveness for E-Learning with Progressive Web App Approach: a Narrative Review
2018
International Journal of Engineering & Technology
As a first step, the study of animation and e-learning development became the basis of this narrative literature. ...
Understanding the content of a subject is the most fundamental thing a student should do to acquire the skills and knowledge. Animation is one way to provide an interesting way of learning. ...
Acknowledgement This research was supported by School of Graduate Studies, Management and Science University, Malaysia. ...
doi:10.14419/ijet.v7i4.11.20785
fatcat:sk7v6hycu5hvhpch7dszoxtjki
A Particle Swarm Optimized Learning Model of Fault Classification in Web-Apps
2019
IEEE Access
In this paper, an empirical study is conducted to classify faults in bug reports of three open-source web-apps (qaManager, bitWeaver, and WebCalendar) and reviews of two play store web-apps (Dineout: Reserve ...
Classifying faults can intelligently enhance the quality of the web-apps by the assessment of probable faults. ...
testing practitioners to seed similar types of faults for comprehending fault-based testing of Web-Apps. ...
doi:10.1109/access.2019.2894871
fatcat:72plppp2d5fr3dlnqxbbzcjvhm
Mobile-Web App to Self-Manage Low Back Pain: Randomized Controlled Trial
2015
Journal of Medical Internet Research
FitBack app. ...
FitBack app. ...
doi:10.2196/jmir.3130
pmid:25565416
pmcid:PMC4296097
fatcat:mys43oqgbvgkfglg56frnyb4qq
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
2020
Security and Communication Networks
In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular ...
Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. ...
Acknowledgments e study was funded by Institute for Information and Communications Technology Promotion (Grant no. 2020-0-00374, Development of Security Primitives for Unmanned Vehicles). ...
doi:10.1155/2020/8869418
fatcat:sythsc6cmrfc3omddo6tlzacnu
Experimental Evaluation of Security Requirements Engineering Benefits
2018
International Journal of Advanced Computer Science and Applications
The followed methodology was to develop two versions of the same web application, with and without using SRE, then comparing the level of security in each version by running different test tools. ...
The subsequent results clearly support the benefits of the early use of SRE with a 38% security improvement in the secure version of the application. ...
As a result, the secure version of the web app is built with embedded security measures against those vulnerabilities. ...
doi:10.14569/ijacsa.2018.091158
fatcat:twyge6x3y5egliju3i7w6rhfma
Conversational Code Analysis: The Future of Secure Coding
[chapter]
2021
Coding Theory - Recent Advances, New Perspectives and Applications [Working Title]
Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during ...
We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results. ...
Test the system and report results To integrate the Google Actions app with the local web app, Ngrok [39] was chosen as the tunneling tool. ...
doi:10.5772/intechopen.98362
fatcat:r4swii2t6jbuxeg7bdmsko76sy
Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment
[article]
2020
arXiv
pre-print
In this study, we propose a security model design framework to derive the system architecture and the security requirements targeting the restricted environment applied by certain technologies for a particular ...
Organizations can increase the efficiency of public protection and disaster relief (PPDR) operations by securely connecting the services run on their legacy networks to the PS-LTE infrastructure. ...
The service system category corresponds to apps and web servers, as well as a DMZ firewall. ...
arXiv:2009.12116v2
fatcat:m7ttls5icfdpppgwqf7gq7occa
Security Analysis of Cordova Applications in Google Play
2017
Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17
CCS CONCEPTS • Security and privacy → Web application security; Domain-specific security and privacy architectures; ...
This paper gives a statistical overview of the adoption of Cordova security best practices and mechanisms in Cordova applications downloaded from the Google Play Store. ...
For this test, a list of over 20 commonly used JavaScript Frameworks was compiled and searched for in the decompiled applications. ...
doi:10.1145/3098954.3103162
dblp:conf/IEEEares/WillocxVN17
fatcat:z6ym7skkxfcmdca5defvtwdxcm
Toward Engineering a Secure Android Ecosystem
2016
ACM Computing Surveys
The openness and extensibility of Android have made it a popular platform for mobile devices and a strong candidate to drive the Internet-of-Things. ...
Based on our collection of knowledge, we envision a blueprint for engineering a secure, next-generation Android ecosystem. ...
AndroTest [Shauvik et al. 2015 ] provides a comprehensive summary and comparison of existing Android testing tools. ...
doi:10.1145/2963145
fatcat:d5vhxpdywrevvbh4as6vvt576q
Conversational Code Analysis: The Future of Secure Coding
[article]
2021
arXiv
pre-print
Consequently, we propose MyCodeAnalyzer, a Google Assistant app and code analysis framework, which was designed to interactively scan program code for vulnerabilities and flaws using voice commands during ...
We describe the proposed methodology, implement a prototype, test it on a vulnerable project and present our results. ...
Chose a vulnerable project
Test the system and report results To integrate the Google Actions app with the local web app, Ngrok [38] was chosen as the tunneling tool. ...
arXiv:2105.03502v2
fatcat:xnfu6xaxb5dg7ezkqvmdoyvs4i
Secure MedRecord – Your Medical Record, in Your Pocket
2020
International Journal of Current Research and Review
The authors are also grateful to authors / editors / publishers of all those articles, journals and books from where the literature for this article has been reviewed and discussed. ...
Acknowledgement: Authors acknowledge the immense help received from the scholars whose articles are cited and included in references of this manuscript. ...
Reminder apps are categorized into 3 types which are Simple Medication Reminders (SMR), Advanced Medication Reminders (AMR) and Medication Management Apps (MMA). ...
doi:10.31782/ijcrr.2020.121711
fatcat:25y3f7s6jja5zijybf5qwk7s3m
Android Security Development: SpywareDetection, Apps Secure Level and Data Encryption Improvement
2019
International Journal of Advanced Computer Science and Applications
We present a method that uses manifest files to determine the presence of spyware and the security level of apps. ...
Most Android users are unaware that their smartphones are as vulnerable as any computer, and that permission by Android users is an important part of maintaining the security of Android smartphones. ...
Android Permission Groups The Android web area [4] shows that Android categorizes all of its permissions group by group. ...
doi:10.14569/ijacsa.2019.0100625
fatcat:ctodgjplxje67leisgc5aixxsu
Improving Smartphone Security and Reliability
2017
Journal of Interconnection Networks (JOIN)
Next, we present several security applications of our infrastructure: a permission evolution study on the Android ecosystem; understanding and quantifying the risk posed by URL accesses in benign and malicious ...
Users are increasingly relying on smartphones, hence concerns such as mobile app security, privacy, and correctness have become increasingly pressing. ...
The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory ...
doi:10.1142/s0219265917400023
fatcat:yq7yda6d4ras7a75jr33mzm3la
« Previous
Showing results 1 — 15 out of 10,564 results