Comprehensive review and analysis of anti-malware apps for smartphones
The new and disruptive technologies for ensuring smartphone security are very limited and
largely scattered. The available options and gaps in this research area must be analysed to …
largely scattered. The available options and gaps in this research area must be analysed to …
A review of bring your own device on security issues
Mobile computing has supplanted internet computing because of the proliferation of cloud-
based applications and mobile devices (such as smartphones, palmtops, and tablets). As a …
based applications and mobile devices (such as smartphones, palmtops, and tablets). As a …
Remote mobile screen (RMS): An approach for secure BYOD environments
SG Ocano, B Ramamurthy… - … Conference on Computing …, 2015 - ieeexplore.ieee.org
The introduction of bring your own device (BYOD) policy in the corporate world creates
benefits for companies as well as job satisfaction for the employee. However, it also creates …
benefits for companies as well as job satisfaction for the employee. However, it also creates …
[PDF][PDF] A Lightweight Attribute-Based Access Control System for IoT.
S Monir - 2016 - harvest.usask.ca
The evolution of the Internet of things (IoT) has made a significant impact on our daily and
professional life. Home and office automation are now even easier with the implementation …
professional life. Home and office automation are now even easier with the implementation …
[PDF][PDF] App-ray: User-driven and fully automated android app security assessment
D Titze, P Stephanow, J Schütte - Fraunhofer AISEC …, 2013 - aisec.fraunhofer.de
Android is currently the prevailing mobile operating system accompanied by a huge number
of apps available at various online market platforms. To protect against malicious or …
of apps available at various online market platforms. To protect against malicious or …
[PDF][PDF] BYOD 安全威脅之彙整與分類
陳昱仁, 廖耕億, 王齎諺 - Communications of the CCISA, 2017 - cccisa.ccisa.org.tw
行動設備日益普及, 自攜設備(Bring Your Own Device, BYOD) 議題逐漸受到重視, BYOD
代表了企業行動模式的新階段, 將有可能改變人們和企業未來的工作方式. 在享有BYOD …
代表了企業行動模式的新階段, 將有可能改變人們和企業未來的工作方式. 在享有BYOD …
A framework for enhancing corporate data security in a bring your own device (Byod) environment: a case of government organizations in Kenya.
GK Sowek - 2018 - 41.89.49.13
Information and Communication Technology (ICT) has become an integral part of the lives of
many people today. In the business scene, ICT has been embedded into the fabric of many …
many people today. In the business scene, ICT has been embedded into the fabric of many …
A byod framework for secure use of mobile devices in universities: The case of universities in Kenya
DK Ndeng'ere - 2017 - 41.89.49.13
This project was to find out security threats, challenges and attacks brought about by BYOD
adoption in institutions. Universities in Kenya as institutions of higher learning were chosen …
adoption in institutions. Universities in Kenya as institutions of higher learning were chosen …
Analysis and Mitigation of Security Issues on Android
DO Titze - 2019 - mediatum.ub.tum.de
This thesis investigates automated application analysis and subsequent mitigation of issues
in Android apps. A framework for automated app analysis is proposed which can handle …
in Android apps. A framework for automated app analysis is proposed which can handle …
[PDF][PDF] Secure Remote Mobile Screening (SRMS) Framework for Bring Your Own Device (BYOD)
S Alnefaie, O Batarfi - ijcset.net
Bring Your Own Device (BYOD) refers to allowing the employee to bring his own device to
the work place to use the company resources (eg network, software or data). Involving …
the work place to use the company resources (eg network, software or data). Involving …