Login / Signup
Cybersecurity for Android Applications: Permissions in Android 5 and 6.
Scott R. Moore
Huangyi Ge
Ninghui Li
Robert W. Proctor
Published in:
Int. J. Hum. Comput. Interact. (2019)
Keyphrases
</>
access control
mobile devices
mobile platforms
malware detection
android application
api calls
mobile apps
mobile applications
location aware
development tools
role based access control
databases
machine learning and data mining
fine grained
distributed systems
access control models
video sequences
computer vision