18 results with keyword: 'security threats to android apps'
Our study reveals that highly sensitive user data, such as identity and investment interests, can be inferred from public resources by a malicious app with zero permission on
N/A
Tutors can help ease students’ frustration by guiding them through example problems related to the holes in their learning.?.
N/A
In the present semi- blind beamforming application, owing to the initial infor- mation provided by the training pilots, the algorithm con- verges much faster than the pure
N/A
The seismic responses and damage of components near the rail are sensitive to the driving safety of train after earthquakes, and should be little in theory. 14 and 15 show
N/A
The State of iOS and Android Security Threats to Enterprise Mobility.. Android security threats consist of prevalent and increasingly more sophisticated malware attacks, as well
N/A
• Measuring OffshOre Wind POWer • advancing the sMart grid • the safety Of sMart aPPliances ul.com/newscience new science SUSTAINABLE ENERGY JouRnAl 1 issue...
N/A
University of Tehran (CIPCE, Sch and 1997, where he is a Researc Fereidunian is a faculty member at University of Technology (PWU serves as an independent consul research
N/A
The difference is that the generative principles of each are antithetical in a crucial respect: the dominant cognitive imperative of memory is its representational adequacy to
N/A
Five problems are considered in this study taking into account the effect of various parameters such as the effect of the magnetic field, the volume fraction
N/A
On the other hand, the 1046 novel double-sided EXIT chart matching algorithm utilize this 1047 design freedom sufficiently, in order to parametrize the IrUEC- 1048 IrURC scheme
N/A
Dragomir, A refinement of Ostrowski’s inequality for absolutely continuous functions whose derivatives belong to and applications, Libertas Math.. Dragomir, Some companions
N/A
One of the tests used a climate chamber to expose the sensor with a controlled temperature and humidity and the two other tests were outdoor tests next to a reference
N/A
Android Security Evaluation Framework (ASEF) and Static Android Analysis Framework (SAAF) to evaluate the Android apps and estimate the total time needed to evaluate
N/A
11(a) changed almost in the same directions. After the seismic responses under the uniform excitation and the travelling wave were compared with each other, the
N/A
11(a) changed almost in the same directions. After the seismic responses under the uniform excitation and the travelling wave were compared with each other, the
N/A
Keywords: Wireless Sensor Networks; Ant Colony Optimization; Data Aggregation; Adaptive Rule; Clustering Based Dynamic
N/A
the potential of virtualization as an adaptation mechanism for industrial districts; strategic alliances as a source of knowledge for SMEs; the eff ect of legitimacy building
N/A