The process of testing vulnerabilities of mobile software applications has been analysed. This is due to the need to prevent violations of confidentiality, integrity and availability of information. Individual users and the state as a wholebenefit from the preservation of these properties. However, in practice this is mostly neglected, and attention is paid to the functional testing. While the known approaches of testing vulnerabilities of the mobile software applications are focused on thestudy of certain aspects: either a server or a client. At the same time, the applicability of the international standards of testing vulnerabilities in mobile software applications has been established. A characteristic feature of their guidelines is the ...
Nowadays, using mobile applications is a daily routine for all of us. This trend is misusedby hacker...
With the development of information technology, humanity is increasingly delving into the world of g...
How secure is your application? How can you evaluate if it is secure? The threats are many and may b...
Testing the security of mobile software applications by OWASP guidelines was analyzed. Attention is ...
In the first part of the article we discuss international, industrial and national standards and met...
The mobile applications have overtaken web applications in the rapid growing of the mobile app marke...
This master thesis is focused on an implementation of application for Android operating system that ...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
Although the importance of mobile applications grows every day, recent vulnerability reports argue t...
Mobile computing is on the rise. More and more users rely on mobile applications and mobile devices ...
With the increasing complexity of application software there is an acute need for software analysis ...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
To achieve a satisfactory level of security of an information system, different system and applicati...
Mobile applications play a critical role in modern society. Although mobile apps are widely adopted,...
Smartphones play an important role in our daily lives. Once used only for communication purposes are...
Nowadays, using mobile applications is a daily routine for all of us. This trend is misusedby hacker...
With the development of information technology, humanity is increasingly delving into the world of g...
How secure is your application? How can you evaluate if it is secure? The threats are many and may b...
Testing the security of mobile software applications by OWASP guidelines was analyzed. Attention is ...
In the first part of the article we discuss international, industrial and national standards and met...
The mobile applications have overtaken web applications in the rapid growing of the mobile app marke...
This master thesis is focused on an implementation of application for Android operating system that ...
The number of applications for the Android platform found on Google Play is now over 1 million and t...
Although the importance of mobile applications grows every day, recent vulnerability reports argue t...
Mobile computing is on the rise. More and more users rely on mobile applications and mobile devices ...
With the increasing complexity of application software there is an acute need for software analysis ...
M.Sc. (Computer Science)Abstract: Web applications have been the target of endless attacks which rea...
To achieve a satisfactory level of security of an information system, different system and applicati...
Mobile applications play a critical role in modern society. Although mobile apps are widely adopted,...
Smartphones play an important role in our daily lives. Once used only for communication purposes are...
Nowadays, using mobile applications is a daily routine for all of us. This trend is misusedby hacker...
With the development of information technology, humanity is increasingly delving into the world of g...
How secure is your application? How can you evaluate if it is secure? The threats are many and may b...