Results 51 to 60 of about 448,484 (228)

INFORMATION SYSTEM FOR EDUCATIONAL EVALUATION OF UNIVERSITY'S ACADEMIC ACTIVITIES [PDF]

open access: yes, 2018
The system of academic activities in higher education institutions is a program created to enable students and academic activities to communicate with each other.
ASHOUR, Salim Fathi Salim   +2 more
core  

Conceptual evidence collection and analysis methodology for Android devices

open access: yes, 2015
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa   +23 more
core   +1 more source

Analysis of the development Android’s runtime

open access: yesJournal of Computer Sciences Institute, 2019
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj   +1 more source

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

open access: yes, 2017
Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications.
A Mylonas   +10 more
core   +1 more source

HTTP behavior characteristics generation and extraction approach for Android malware

open access: yesDianxin kexue, 2016
Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP ...
Yaling LUO, Wenwei LI, Xin SU
doaj   +2 more sources

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

An Empirical Study on Android-related Vulnerabilities

open access: yes, 2017
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele   +2 more
core   +1 more source

Understanding Android Security [PDF]

open access: yes, 2015
This paper details a survey of Android users in an attempt to shed light on how users perceive the risks associated with app permissions and in- built adware. A series of questions was presented in a Web survey, with results suggesting interesting differences between males and females in installation be- haviour and attitudes toward security.
Robinson, Gregor, Weir, George
openaire   +1 more source

MAMoC-Android: Multisite Adaptive Computation Offloading for Android Applications [PDF]

open access: yes2019 7th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2019
Computational offloading has been widely used to improve the performance of mobile applications and conserve the energy of mobile devices. Prior studies have primarily focused on a form of offloading where only a single server is considered as the offloading site. However, mobile devices now have access to a range of nearby mobile and fixed devices and
Sulaiman, Dawand Jalil   +1 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy