Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
8,845
Downloads
15,969
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,340
Downloads
8,676
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,995
Downloads
5,398
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,644
Downloads
5,116
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,701
Downloads
5,964
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
633
Downloads
1,993
Views
Citations
Living Status/Shelter of Street Families of Kolkata: Prospects and Challenges
(Articles)
Harasankar Adhikari
Open Access Library Journal
Vol.1 No.6
,September 25, 2014
DOI:
10.4236/oalib.1100571
1,385
Downloads
2,269
Views
Citations
Ubiquitous Mobile Sensing for Water Quality Monitoring and Reporting within Lake Victoria Basin
(Articles)
Anthony Faustine
,
Aloys N. Mvuma
Wireless Sensor Network
Vol.6 No.12
,December 4, 2014
DOI:
10.4236/wsn.2014.612025
8,199
Downloads
9,530
Views
Citations
Android/iPhone Mobile Application for Quick Response Pilgrims Campaign Locator
(Articles)
Talal H. Noor
,
El-Sayed Atlam
,
Zohair S. Malki
,
Ahmad Reda Alzighaibi
,
Hasan Hashim
,
Rasha El-Agamy
Journal of Computer and Communications
Vol.8 No.5
,May 8, 2020
DOI:
10.4236/jcc.2020.85001
597
Downloads
1,502
Views
Citations
This article belongs to the Special Issue on
Digital Communications and Networking
Design and Implementation of an Android GIS Data Collection Application for Students with Non-Programming Experience Using the MIT App Inventor: A Case Study on a Tick Data Collection APP
(Articles)
Manuel Ndebele
,
Aldridge N. Mazhindu
Intelligent Information Management
Vol.15 No.1
,January 31, 2023
DOI:
10.4236/iim.2023.151002
498
Downloads
1,781
Views
Citations
Risks behind Device Information Permissions in Android OS
(Articles)
Ali Alshehri
,
Anthony Hewins
,
Maria McCulley
,
Hani Alshahrani
,
Huirong Fu
,
Ye Zhu
Communications and Network
Vol.9 No.4
,November 10, 2017
DOI:
10.4236/cn.2017.94016
2,489
Downloads
12,128
Views
Citations
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
(Articles)
Nick Rahimi
,
John Nolen
,
Bidyut Gupta
Journal of Information Security
Vol.10 No.2
,April 1, 2019
DOI:
10.4236/jis.2019.102005
1,707
Downloads
4,726
Views
Citations
Design of e-Land Record Information System with Google Map Using Mobile Commerce
(Articles)
Kanwalvir Singh
,
Himanshu Aggarwal
Journal of Software Engineering and Applications
Vol.6 No.4
,April 29, 2013
DOI:
10.4236/jsea.2013.64027
6,026
Downloads
9,758
Views
Citations
The Design of a Mobile Phone-Based Remote-Control Application to Submersible Motor for Effective Water Supply
(Articles)
Winfred Adjardjah
,
David Bright Kofi Arthur
,
Alex Ewuam
,
Kingsley Nunoo
Journal of Sensor Technology
Vol.12 No.2
,June 30, 2022
DOI:
10.4236/jst.2022.122002
192
Downloads
1,721
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
15,922
Downloads
44,377
Views
Citations
The Content Security Mechanism of Smart TV Broadcasting Operating System
(Articles)
Xin Wang
Open Access Library Journal
Vol.2 No.11
,November 25, 2015
DOI:
10.4236/oalib.1102030
940
Downloads
1,730
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,921
Downloads
5,226
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
153
Downloads
733
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Design and Implementation of Mobile Application for Results Dissemination System
(Articles)
Mukarukundo Josette
Journal of Software Engineering and Applications
Vol.10 No.9
,August 28, 2017
DOI:
10.4236/jsea.2017.109044
1,611
Downloads
6,792
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.6 No.10
,October 25, 2013
DOI:
10.4236/ijcns.2013.610046
4,690
Downloads
7,672
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top