Login
Login
切换导航
Home
Articles
Journals
Books
News
About
Services
Submit
Home
Journal
Articles
Journals A-Z
Browse Subjects
Biomedical & Life Sci.
Business & Economics
Chemistry & Materials Sci.
Computer Sci. & Commun.
Earth & Environmental Sci.
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sci. & Humanities
Browse Subjects
Biomedical & Life Sciences
Business & Economics
Chemistry & Materials Science
Computer Science & Communications
Earth & Environmental Sciences
Engineering
Medicine & Healthcare
Physics & Mathematics
Social Sciences & Humanities
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Publish with us
Paper Submission
Information for Authors
Peer-Review Resources
Open Special Issues
Open Access Statement
Frequently Asked Questions
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Complete Matching
Editorial Board
Show/Hide Options
Show/Hide Options
All
Title
Abstract
Keywords
DOI
Author
Journal
Affiliation
ISSN
Subject
Analysis of Malware Families on Android Mobiles: Detection Characteristics Recognizable by Ordinary Phone Users and How to Fix It
(Articles)
Hieu Le Thanh
Journal of Information Security
Vol.4 No.4
,September 11, 2013
DOI:
10.4236/jis.2013.44024
8,820
Downloads
15,906
Views
Citations
An Overview of Mobile Malware and Solutions
(Review)
Fan Wu
,
Hira Narang
,
Dwayne Clarke
Journal of Computer and Communications
Vol.2 No.12
,October 22, 2014
DOI:
10.4236/jcc.2014.212002
5,330
Downloads
8,639
Views
Citations
Phishing Techniques in Mobile Devices
(Articles)
Belal Amro
Journal of Computer and Communications
Vol.6 No.2
,February 13, 2018
DOI:
10.4236/jcc.2018.62003
1,984
Downloads
5,353
Views
Citations
Camera and Voice Control Based Location Services and Information Security on Android
(Articles)
Jitendra G. Chouhan
,
Nikhil Kumar Singh
,
Prashant S. Modi
,
Keyurbhai A. Jani
,
Bhavin N. Joshi
Journal of Information Security
Vol.7 No.3
,April 15, 2016
DOI:
10.4236/jis.2016.73015
3,637
Downloads
5,101
Views
Citations
Associated Risks in Mobile Applications Permissions
(Articles)
Mohammed Al Jutail
,
Mousa Al-Akhras
,
Abdulaziz Albesher
Journal of Information Security
Vol.10 No.2
,March 26, 2019
DOI:
10.4236/jis.2019.102004
1,691
Downloads
5,902
Views
Citations
Improving the Cybersecurity Framework for Future Consumer Networks
(Articles)
Tyler Welker
,
Olatunde Abiona
Int'l J. of Communications, Network and System Sciences
Vol.14 No.4
,April 30, 2021
DOI:
10.4236/ijcns.2021.144004
622
Downloads
1,960
Views
Citations
Living Status/Shelter of Street Families of Kolkata: Prospects and Challenges
(Articles)
Harasankar Adhikari
Open Access Library Journal
Vol.1 No.6
,September 25, 2014
DOI:
10.4236/oalib.1100571
1,378
Downloads
2,239
Views
Citations
Ubiquitous Mobile Sensing for Water Quality Monitoring and Reporting within Lake Victoria Basin
(Articles)
Anthony Faustine
,
Aloys N. Mvuma
Wireless Sensor Network
Vol.6 No.12
,December 4, 2014
DOI:
10.4236/wsn.2014.612025
8,189
Downloads
9,505
Views
Citations
Android/iPhone Mobile Application for Quick Response Pilgrims Campaign Locator
(Articles)
Talal H. Noor
,
El-Sayed Atlam
,
Zohair S. Malki
,
Ahmad Reda Alzighaibi
,
Hasan Hashim
,
Rasha El-Agamy
Journal of Computer and Communications
Vol.8 No.5
,May 8, 2020
DOI:
10.4236/jcc.2020.85001
582
Downloads
1,458
Views
Citations
This article belongs to the Special Issue on
Digital Communications and Networking
Design and Implementation of an Android GIS Data Collection Application for Students with Non-Programming Experience Using the MIT App Inventor: A Case Study on a Tick Data Collection APP
(Articles)
Manuel Ndebele
,
Aldridge N. Mazhindu
Intelligent Information Management
Vol.15 No.1
,January 31, 2023
DOI:
10.4236/iim.2023.151002
492
Downloads
1,745
Views
Citations
Risks behind Device Information Permissions in Android OS
(Articles)
Ali Alshehri
,
Anthony Hewins
,
Maria McCulley
,
Hani Alshahrani
,
Huirong Fu
,
Ye Zhu
Communications and Network
Vol.9 No.4
,November 10, 2017
DOI:
10.4236/cn.2017.94016
2,478
Downloads
11,843
Views
Citations
Android Security and Its Rooting—A Possible Improvement of Its Security Architecture
(Articles)
Nick Rahimi
,
John Nolen
,
Bidyut Gupta
Journal of Information Security
Vol.10 No.2
,April 1, 2019
DOI:
10.4236/jis.2019.102005
1,698
Downloads
4,669
Views
Citations
Design of e-Land Record Information System with Google Map Using Mobile Commerce
(Articles)
Kanwalvir Singh
,
Himanshu Aggarwal
Journal of Software Engineering and Applications
Vol.6 No.4
,April 29, 2013
DOI:
10.4236/jsea.2013.64027
6,004
Downloads
9,702
Views
Citations
The Design of a Mobile Phone-Based Remote-Control Application to Submersible Motor for Effective Water Supply
(Articles)
Winfred Adjardjah
,
David Bright Kofi Arthur
,
Alex Ewuam
,
Kingsley Nunoo
Journal of Sensor Technology
Vol.12 No.2
,June 30, 2022
DOI:
10.4236/jst.2022.122002
182
Downloads
1,649
Views
Citations
Secure Bluetooth for Trusted m-Commerce
(Articles)
Pasquale Stirparo
,
Jan Löschner
Int'l J. of Communications, Network and System Sciences
Vol.6 No.6
,June 18, 2013
DOI:
10.4236/ijcns.2013.66030
15,909
Downloads
44,341
Views
Citations
The Content Security Mechanism of Smart TV Broadcasting Operating System
(Articles)
Xin Wang
Open Access Library Journal
Vol.2 No.11
,November 25, 2015
DOI:
10.4236/oalib.1102030
931
Downloads
1,711
Views
Citations
Enhancing Multi-Factor Authentication in Modern Computing
(Articles)
Ekwonwune Emmanuel Nwabueze
,
Iwuoha Obioha
,
Oju Onuoha
Communications and Network
Vol.9 No.3
,August 9, 2017
DOI:
10.4236/cn.2017.93012
1,893
Downloads
5,142
Views
Citations
Enhancing Mobile Security through Comprehensive Penetration Testing
(Articles)
Maryam Roshanaei
Journal of Information Security
Vol.15 No.2
,February 27, 2024
DOI:
10.4236/jis.2024.152006
124
Downloads
574
Views
Citations
This article belongs to the Special Issue on
Cybersecurity and Information Security
Design and Implementation of Mobile Application for Results Dissemination System
(Articles)
Mukarukundo Josette
Journal of Software Engineering and Applications
Vol.10 No.9
,August 28, 2017
DOI:
10.4236/jsea.2017.109044
1,602
Downloads
6,730
Views
Citations
Wireless Network Security: The Mobile Agent Approach
(Articles)
Olatunde Abiona
,
Adeniran Oluwaranti
,
Ayodeji Oluwatope
,
Surura Bello
,
Clement Onime
,
Mistura Sanni
,
Lawrence Kehinde
Int'l J. of Communications, Network and System Sciences
Vol.6 No.10
,October 25, 2013
DOI:
10.4236/ijcns.2013.610046
4,673
Downloads
7,625
Views
Citations
<
1
2
3
...
>
Follow SCIRP
Contact us
+1 323-425-8868
customer@scirp.org
+86 18163351462(WhatsApp)
1655362766
Paper Publishing WeChat
Free SCIRP Newsletters
Home
Journals A-Z
Subject
Books
Sitemap
Contact Us
About SCIRP
Publication Fees
For Authors
Peer-Review Issues
Special Issues
News
Service
Manuscript Tracking System
Subscription
Translation & Proofreading
FAQ
Volume & Issue
Policies
Open Access
Publication Ethics
Preservation
Retraction
Privacy Policy
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top