Android Executable Modeling: Beyond Android Programming [PDF]
This paper demonstrates through an example how a modeling effort can substitute to a programming effort so that a main part of the code of apps for smart devices can be replaced by a model. We focus on the behavioral model of an application and then instrument its direct execution on an Android device thanks to the PauWare API.
Olivier Le Goaer +3 more
openaire +1 more source
Do customized Android frameworks keep pace with Android?
The project is used to explore how customized Android Frameworks sync up with official Android Frameworks. 1. Clone corresponding customized Android Frameworks into directory platforms. 2. Retrieve commit history of customized Android Frameworks and store into directory history. 3. Run Python scripts to acquire merge and conflict information.
Liu, Pei +3 more
openaire +2 more sources
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it ...
Ya Pan +3 more
doaj +1 more source
The development of Android-based learning media using Kodular in making suit patterns subject
This research aims to produce Android-based interactive learning media by utilizing the Kodular application for learning materials for making suit patterns for XII grade students of Fashion Management Vocational Schools.
Fitri Nurjanah, Sri Emy Yuli Suprihatin
doaj +1 more source
Rancang Bangun Aplikasi Pengarsipan Berkas Berbasis Android pada Kantor Notaris NJ
Archives is a collection of records or documents containing information on the activities and transactions of an organization, institution, and company. The Notary office NJ notary has been using conventional methods for archiving files, which requires a
Dian Novita Sari +1 more
doaj +1 more source
Android Malware Clustering through Malicious Payload Mining
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos +7 more
core +1 more source
Testosterone therapy-induced erythrocytosis: can phlebotomy be justified?
Erythrocytosis, or elevated hematocrit, is a common side effect of testosterone therapy (TTh) in male hypogonadism. Testosterone stimulates erythropoiesis through an initial rise in erythropoietin (EPO), the establishment of a new EPO/hemoglobin ‘set ...
Peter Bond +2 more
doaj +1 more source
Predicting the Impact of Android Malicious Samples via Machine Learning
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples.
Junyang Qiu +5 more
doaj +1 more source
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios +2 more
core +2 more sources
Selective androgen receptor modulators: a critical appraisal
The concept of selective androgen receptor modulators (SARMs) was introduced in 1999 in analogy to selective estrogen receptor modulators (SERMs).
Peter Bond +5 more
doaj +1 more source

