Detecting GNSS Jamming and Spoofing on Android Devices
Global navigation satellite system (GNSS) location engines on Android devices provide location and navigation utility to billions of people worldwide. However, these location engines currently have very limited protection from threats to their position ...
Nicholas Spens +3 more
doaj +1 more source
A Systematic Literature Review of Android Malware Detection Using Static Analysis
Android malware has been in an increasing trend in recent years due to the pervasiveness of Android operating system. Android malware is installed and run on the smartphones without explicitly prompting the users or without the user's permission, and it ...
Ya Pan +3 more
doaj +1 more source
The development of Android-based learning media using Kodular in making suit patterns subject
This research aims to produce Android-based interactive learning media by utilizing the Kodular application for learning materials for making suit patterns for XII grade students of Fashion Management Vocational Schools.
Fitri Nurjanah, Sri Emy Yuli Suprihatin
doaj +1 more source
Rancang Bangun Aplikasi Pengarsipan Berkas Berbasis Android pada Kantor Notaris NJ
Archives is a collection of records or documents containing information on the activities and transactions of an organization, institution, and company. The Notary office NJ notary has been using conventional methods for archiving files, which requires a
Dian Novita Sari +1 more
doaj +1 more source
Testosterone therapy-induced erythrocytosis: can phlebotomy be justified?
Erythrocytosis, or elevated hematocrit, is a common side effect of testosterone therapy (TTh) in male hypogonadism. Testosterone stimulates erythropoiesis through an initial rise in erythropoietin (EPO), the establishment of a new EPO/hemoglobin ‘set ...
Peter Bond +2 more
doaj +1 more source
Android Malware Clustering through Malicious Payload Mining
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos +7 more
core +1 more source
Selective androgen receptor modulators: a critical appraisal
The concept of selective androgen receptor modulators (SARMs) was introduced in 1999 in analogy to selective estrogen receptor modulators (SERMs).
Peter Bond +5 more
doaj +1 more source
Generating Predicate Callback Summaries for the Android Framework
One of the challenges of analyzing, testing and debugging Android apps is that the potential execution orders of callbacks are missing from the apps' source code.
Le, Wei, Perez, Danilo Dominguez
core +1 more source
Predicting the Impact of Android Malicious Samples via Machine Learning
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples.
Junyang Qiu +5 more
doaj +1 more source
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios +2 more
core +2 more sources

