Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Effective Identification of Malicious Threats and Security Issues in Android Apps


Affiliations
1 Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, India
     

   Subscribe/Renew Journal


The Mobile phones are used world widely, the day without mobile phone is imaginary now-a-days. The consequence of using App is security. In order to avoid security problem, we use three methods:user review, user rating, online feedback. In Online feedback we use url to represent the security level. There are three levels of risk:high, low, medium. User rating and user review are taken as input and online feedback are produced as result.

Keywords

Risk Communication, Usability, Mobile Security.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 312

PDF Views: 5




  • Effective Identification of Malicious Threats and Security Issues in Android Apps

Abstract Views: 312  |  PDF Views: 5

Authors

G. Sowmiya Devi
Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, India
S. Suhashini
Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, India
T. Nagamani
Department of Computer Science and Engineering, Bannari Amman Institute of Technology, Sathyamangalam, Erode, India

Abstract


The Mobile phones are used world widely, the day without mobile phone is imaginary now-a-days. The consequence of using App is security. In order to avoid security problem, we use three methods:user review, user rating, online feedback. In Online feedback we use url to represent the security level. There are three levels of risk:high, low, medium. User rating and user review are taken as input and online feedback are produced as result.

Keywords


Risk Communication, Usability, Mobile Security.



DOI: https://doi.org/10.36039/ciitaas%2F8%2F2%2F2016%2F106707.31-33