Publisher
Springer International Publishing
Reference42 articles.
1. Wu, L., Grace, M., Zhou, Y., Wu, C., Jiang, X.: The impact of vendor customizations on Android security. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 623–634,(2013). https://doi.org/10.1145/2508859.2516728
2. Pousttchi, K., Schuring, M.: Assessment of today’s mobile banking applications from the view of customer requirements. In: Proceedings of the 37th Annual Hawaii international Conference (2004)
3. Shashank Gupta et al. 2015. PHP-sensor: a prototype method to discover workflow violation and XSS vulnerabilities in PHP web applications. In Proceedings of the 12th ACM International Conference on Computing Frontiers (CF ’15). Association for Computing Machinery, New York, NY, USA, Article 59, pp. 1–8. https://doi.org/10.1145/2742854.2745719
4. Yuan, H., Tang, Y., Wenjuan, S., Liu, L.: A detection method for android application security based on TF-IDF and machine learning. PloS One 15, e0238694 (2020). https://doi.org/10.1371/journal.pone.0238694
5. Sanchez, A.: Security Flaws in mobile banking apps identified by researcher. Out-Law.com, 13 Jan 2014. [Online]. Available: www.out-law.com/en/articles/2014/january/security-flaws-inmobile-banking-apps-identifie d-by-researcher/. Accessed 25 Oct 2015
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. IoT-enabled smart farming with Industry 5.0;Journal of High Speed Networks;2024-08-02
2. Applying Visual Cryptography to Decrypt Data Using Human Senses;Advances in Information Security, Privacy, and Ethics;2024-07-12
3. Next Gen Security With Quantum-Safe Cryptography;Advances in Information Security, Privacy, and Ethics;2024-07-12
4. Zero Knowledge Proofs and Their Applications in Cryptography;Advances in Information Security, Privacy, and Ethics;2024-07-12
5. Homomorphic Encryption in Smart City Applications for Balancing Privacy and Utility;Advances in Information Security, Privacy, and Ethics;2024-07-12