ARTICLES

Filter  
Active filters 0
Remove
  

Refine your searches by:

Collections
Computing
Technology
Social Sciences
Education
Computing
Architecture and Urbanism
Law
History
Research
Biology
all records (45)

Languages
English

Countries
Indonesia
USA
Ukraine
Canada
Spain
Turkey, Turkish Republic
Australia
Brazil
Netherlands
United Kingdom
all records (27)

Years
2023
2022
2021
2020
2019
2018
2017
2016
2015
2014
all records (17)

Filter  
 
113  Articles
1 of 12 pages  |  10  records  |  more records»
With an exponential growth in smartphone applications targeting useful services such as banks, healthcare, m-commerce, security has become a primary concern. The applications downloaded from unofficial sources pose a security threat as they lack mechanism... see more

Due to the weak policy of submitting application to Google Play store, attackers developed malware to attack the users of the Android operating system with malware application or by including malicious code into applications. Researchers have been done in... see more

The government took the policy of applying for location permits through the Online Single Submission system to improve the national economy. This research aims to determine the arrangement and implementation of location permit application services through... see more

Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious And... see more

AbstractObjective – The purpose of this study is to understand the practices and approaches followed by Canadian universities in copyright education, permissions clearance, and policy development in light of major changes to Canadian copyright law that oc... see more

 Malware is software created to exploit or attack computer systems. Some of the consequences caused by malware such as data leakage, data destruction, and unauthorized access that harm application users. Random Forest as a classification method has b... see more

There are obstacles for business actors in establishing Micro, Small and Medium Enterprises or MSMEs. It is related to the many conditions in permissions of establishments MSMEs that make it difficult for business actors to establish MSMEs. Even it has an... see more

The Personal Identification Number or KTP is prone to be stolen and used by unwanted parties, this is also a possibility for the Simpel Desa, a village administration application that also contain and use the Personal Identification Number. This study aim... see more

The objective of this study is to present progress on management and conservation of with tailed-deer (Odocoileus virginianus) at the Mixteca poblana; an ethnic region whit 47 municipalities and 10,565.7 km2, whit semiarid and arid climates, rangeland slo... see more

1 of 12 pages  |  10  records  |  more records»