mobile security
Recently Published Documents


TOTAL DOCUMENTS

305
(FIVE YEARS 54)

H-INDEX

13
(FIVE YEARS 1)

Author(s):  
Harsh Makadia ◽  
Jainish Kotadia

This document offers data involving mobile security exploitation penetration testing. Compared to desktop computers the expansion of mobile devices is tremendous in this years. Mobile de- vices are integrated into daily activities of people’s life. Mobile Applications became a part of our daily lives in order that virtually each internet or desktop application may be executed from a smartphone i.e. social networking, online banking, gaming applications and many others. This document also includes about different types of Mobile security threats, Types of penetration testing, Phases of penetrating testing, Principles of testing and Security risk assessment model. Due to the expansion of mobile devices now a days, it opens vast scope for attackers to steal sensitive information or to perform other kinds of attacks on these devices . The main purpose is to know the vulnerability and technics that ac- customed to find vulnerabilities in mobile applications. In the paper we have studied differing kinds of security risks concerned in mobile devices and mobile applications and regarding varied defensive mechanism to stop these security risk in mobile devices.


2021 ◽  
pp. 105-132
Author(s):  
Kutub Thakur ◽  
Al-Sakib Khan Pathan

2021 ◽  
pp. 133-138
Author(s):  
Kutub Thakur ◽  
Al-Sakib Khan Pathan

2021 ◽  
pp. 47-66
Author(s):  
Kutub Thakur ◽  
Al-Sakib Khan Pathan
Keyword(s):  

Author(s):  
Thair Ali Salih ◽  
Mohammed Talal Ghazal ◽  
Zaid Ghanim Mohammed

<p>Nowadays, the development of computer vision technology help to overcome track and identify humans within a location in the complex environment through mobile robots, which gives the motivation to presents a vision-based approach to a mobile security robot. The proposed system utilizes a wireless camera to detect the objects in the field of robot view. Principle component analysis (PCA) algorithm and filters are used to implement and demonstrate the process of the images. This gives the designed system the ability to recognize objects independently from current light conditions. Frame tracking in the images uses an attention system to get an estimate of the position of a person. This estimate helps the applied camera to identify objects with changing background lighting conditions such as a fire inside a building. By using this estimate, the applied camera could identify objects with changing background lighting conditions such as a fire inside premises. The system has been tested using the MATLAB environment, and the empirical performance explains the efficiency and strongness of the suggested device.</p>


2021 ◽  
Vol 4 (1) ◽  
pp. 37-42
Author(s):  
Deta Marsela ◽  
Bayu Pradikto

The purpose of this research is to describe the community participation in empowering the mobile security system. This research is a qualitative descriptive research. This study uses interview data collection techniques, observation and documentation. Checking the validity of the data used triangulation of sources, triangulation of time and triangulation of techniques. The results obtained from the research are the participation of citizens in participating in the security system at Neighborhood Association 19, Cempaka Permai Village, including the participation of thoughts, energy, assets, skills and skills as well as social participation. On the other hand, there is also internal citizen participation and external participation of residents in participating in the participation system of the Neighborhood Association residents around them supporting and attending even though they do not participate in patrols, from agencies from Babinsa, Bhabinkamtibmas, Head of Rukun Warga, Head of Subdistrict, then from the Mayor's Government give an award, one of them is the Bengkulu City Political and National Unity Body.


2021 ◽  
Vol 11 (2) ◽  
pp. 1-25
Author(s):  
Zhiding Hu ◽  
Victor Konrad

English Abstract: Formerly localized, restricted border interaction between China and Southeast Asia has shifted to extensive cross-border engagement along regulated borders with a hierarchy of crossings and expansive borderlands. This expanded security system reveals rescaled and repositioned border security infrastructure and practice into a point and corridor system with vanguard crossings at Hekou, Mohan and Ruili. Fundamental shifts are concurrent focus on primary crossings and spatially extensive borderlands that encompass diminished attention to lesser crossings, beyond the border implementation of security checkpoints, mobile security, and compromise, to enable effective management of expansive borderlands. These borderlands mediate space and enable spatial reapportionment of security to accommodate greatly enhanced cross-border flows of people, goods, and information, thus shaping extensive spaces of exclusion and integration and focused places of exception.Spanish Abstract: La anteriormente restringida interacción fronteriza China–Sudeste Asiático, cambió a un extenso compromiso de fronteras reguladas con una jerarquía de cruces y zonas transfronterizas expansivas. Este sistema ampliado de seguridad, revela la infraestructura y prácticas transfronterizas reescaladas y reubicadas como puntos y sistemas de corredores con cruces de vanguardia en Hekou, Mohan y Ruili. Los cambios se enfocan en los cruces primarios y extensión de fronteras, disminuyendo la atención a los cruces menores —después de la implementación de puntos de control de seguridad—, la seguridad móvil y el compromiso a una gestión fronteriza eficaz. Estas zonas permiten la redistribución espacial de la seguridad acomodando los intensificados flujos transfronterizos de personas, bienes e información, conformando espacios de exclusión e integración, así como lugares de excepción focalizados. French Abstract: L’interaction frontalière entre la Chine et l’Asie du Sud-Est, autrefois localisée et limitée, s’est transformée en un engagement transfrontalier réglementé avec une hiérarchie de passages et des zones frontalières étendues. Ce système de sécurité élargi révèle une infrastructure et une pratique de sécurité frontalière redimensionnées et repositionnées dans un système de points et de corridors avec des passages d’avant-garde à Hekou, Mohan et Ruili. Les changements fondamentaux se concentrent sur les principaux points de passage, les zones frontalières étendues, la mise en œuvre de points de contrôle de sécurité, la sécurité mobile et le compromis, pour permettre une gestion effi cace des zones frontalières étendues. Ces dernières permettre ent la médiation de l’espace et la réaffectation spatiale de la sécurité afin d’accueillir des fl ux transfrontaliers de personnes, de biens et d’informations considérablement accrus, façonnant ainsi de vastes espaces d’exclusion et d’intégration et des lieux d’exception ciblés.


Sign in / Sign up

Export Citation Format

Share Document