Mobile security

Results: 2765



#Item
1SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

SEVENTH FRAMEWORK PROGRAMME Trustworthy ICT Project Title: Enhanced Network Security for Seamless Service Provisioning in the Smart Mobile Ecosystem

Add to Reading List

Source URL: mavroud.is

Language: English - Date: 2018-10-23 09:34:50
2Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

Add to Reading List

Source URL: goverifyid.com

Language: English - Date: 2017-03-13 13:20:54
    3ARM: ANN-based Ranking Model for Privacy and Security Analysis in Smartphone Ecosystems Majid Hatamian∗ , Jetzabel Serna∗ ∗ Chair  of Mobile Business & Multilateral Security

    ARM: ANN-based Ranking Model for Privacy and Security Analysis in Smartphone Ecosystems Majid Hatamian∗ , Jetzabel Serna∗ ∗ Chair of Mobile Business & Multilateral Security

    Add to Reading List

    Source URL: privacyus.eu

    Language: English - Date: 2017-11-10 05:13:34
      4 	
    Mobile Security Solutions Guide Executive Summary .............................................................................................. 2 How Can Cloudmark Help You? ...................................

          Mobile Security Solutions Guide Executive Summary .............................................................................................. 2 How Can Cloudmark Help You? ...................................

      Add to Reading List

      Source URL: www.cloudmark.com

      Language: English - Date: 2016-10-13 13:26:56
        5SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi  Abstract

        SCADA And Mobile Security In The Internet Of Things Era Alexander Bolshev (dark_k3y) Security Consultant, IOActive Ivan Yushkevich (Steph) Information Security Auditor, Embedi Abstract

        Add to Reading List

        Source URL: ioactive.com

        Language: English - Date: 2018-08-17 20:57:56
          6Job Description  Job Role Sr. Mobile (​iOS​) Application Security

          Job Description Job Role Sr. Mobile (​iOS​) Application Security

          Add to Reading List

          Source URL: lucideus.com

          Language: English - Date: 2018-06-07 05:31:57
            7Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

            Using Fraud Patterns for Fraud Risk Assessment of E-services Ahmed Seid Yesuf, Jetzabel Serna-Olvera and Kai Rannenberg Deutsche Telekom Chair of Mobile Business & Multilateral Security, Goethe University Frankfurt, Fran

            Add to Reading List

            Source URL: m-chair.de

            Language: English - Date: 2017-07-31 16:44:18
              8FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1  Chair of Mobile Business and Multilateral Security

              FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1 Chair of Mobile Business and Multilateral Security

              Add to Reading List

              Source URL: www.m-chair.de

              Language: English - Date: 2017-10-05 10:18:54
                9Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

                Prevent your Company From Becoming the Next Security Breach Victim The Traditional Security Perimeter is Gone Sensitive data resides on mobile devices, cloud services, and other locations outside your network. Authorized

                Add to Reading List

                Source URL: www.iwsinc.com

                Language: English - Date: 2016-11-14 11:05:48
                  10FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1  Chair of Mobile Business and Multilateral Security

                  FAIR: Fuzzy Alarming Index Rule for Privacy Analysis in Smartphone Apps Majid Hatamian1? , Jetzabel Serna1 , Kai Rannenberg1 and Bodo Igler2 1 Chair of Mobile Business and Multilateral Security

                  Add to Reading List

                  Source URL: hatamian.net

                  Language: English - Date: 2017-09-07 09:59:08