4.6 Article

A Fog Computing Solution for Context-Based Privacy Leakage Detection for Android Healthcare Devices

Related references

Note: Only part of the references are listed.
Article Computer Science, Information Systems

Security and Privacy Analysis of Mobile Health Applications: The Alarming State of Practice

Achilleas Papageorgiou et al.

IEEE ACCESS (2018)

Article Computer Science, Information Systems

A Fog-Based Healthcare Framework for Chikungunya

Sandeep K. Sood et al.

IEEE INTERNET OF THINGS JOURNAL (2018)

Article Engineering, Multidisciplinary

Application of an Emergency Alarm System for Physiological Sensors Utilizing Smart Devices

James Kang et al.

TECHNOLOGIES (2017)

Article Computer Science, Hardware & Architecture

Security, privacy and trust in Internet of Things: The road ahead

S. Sicari et al.

COMPUTER NETWORKS (2015)

Article Computer Science, Information Systems

Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques

Michael Spreitzenbarth et al.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2015)

Article Computer Science, Software Engineering

FlowDroid: Precise Context, Flow, Field, Object-sensitive and Lifecycle-aware Taint Analysis for Android Apps

Steven Arzt et al.

ACM SIGPLAN NOTICES (2014)

Article Computer Science, Theory & Methods

TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones

William Enck et al.

ACM TRANSACTIONS ON COMPUTER SYSTEMS (2014)

Article Engineering, Electrical & Electronic

A Routing-Driven Elliptic Curve Cryptography Based Key Management Scheme for Heterogeneous Sensor Networks

Xiaojiang Du et al.

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS (2009)

Article Computer Science, Hardware & Architecture

Security in wireless sensor networks

Xiaojiang Du et al.

IEEE WIRELESS COMMUNICATIONS (2008)

Article Engineering, Electrical & Electronic

Internet protocol television (IPTV): The killer application for the next-generation Internet

Yang Xiao et al.

IEEE COMMUNICATIONS MAGAZINE (2007)

Article Computer Science, Information Systems

A survey of key management schemes in wireless sensor networks

Yang Xiao et al.

COMPUTER COMMUNICATIONS (2007)

Article Computer Science, Information Systems

An effective key management scheme for heterogeneous sensor networks

Xiaojiang Du et al.

AD HOC NETWORKS (2007)