Open Access
Issue
MATEC Web Conf.
Volume 395, 2024
2023 2nd International Conference on Physics, Computing and Mathematical (ICPCM2023)
Article Number 01028
Number of page(s) 6
DOI https://doi.org/10.1051/matecconf/202439501028
Published online 15 May 2024
  1. Kouliaridis V., Karopoulos G., Kambourakis G. Assessing the Security and Privacy of Android Official ID Wallet Apps[J]. Information, 2023, 14(8): [Google Scholar]
  2. Gianni D., Eslam F., Massimo F., et al. Privacy-preserving malware detection in Android-based IoT devices through federated Markov chains[J]. Future Generation Computer Systems, 2023, 14893–105. [Google Scholar]
  3. Hutchinson S., Stanković M., Ho S., et al. Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS[J]. Journal of Cybersecurity and Privacy, 2023, 3(2):145–165. [CrossRef] [Google Scholar]
  4. Shinelle H., Meraj M.M., Nicholas W., et al. Investigating Wearable Fitness Applications: Data Privacy and Digital Forensics Analysis on Android[J]. Applied Sciences, 2022, 12(19):9747–9747. [CrossRef] [Google Scholar]
  5. Horn L.I., Ali M.B., Awais R., et al. On the privacy of mental health apps[J]. Empirical Software Engineering, 2022, 28(1):2–2. [Google Scholar]
  6. E. K O., O. C Y. A Multilateral Privacy Impact Analysis Method for Android Applications [J]. Annals of Science and Technology, 2022, 7(2):1–20. [Google Scholar]
  7. Caputo D., Pagano F., Bottino G., et al. You Can't Always Get What You Want: Towards User-Controlled Privacy on Android [J]. IEEE Transactions on Dependable and Secure Computing, 2023, 20(2):975–987. [CrossRef] [Google Scholar]
  8. Haoyu L., Paul P., J D L. On the data privacy practices of Android OEMs.[J]. PloS one, 2023, 18(1):e0279942–e0279942. [CrossRef] [Google Scholar]
  9. Suchul L. Distributed Detection of Malicious Android Apps While Preserving Privacy Using Federated Learning [J]. Sensors, 2023, 23(4):2198–2198. [CrossRef] [Google Scholar]
  10. Hasnat A., Komal B., Muhammad Y., et al. Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code[J]. Security and Communication Networks, 2022, 2022. [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.