Results 51 to 60 of about 448,484 (228)
INFORMATION SYSTEM FOR EDUCATIONAL EVALUATION OF UNIVERSITY'S ACADEMIC ACTIVITIES [PDF]
The system of academic activities in higher education institutions is a program created to enable students and academic activities to communicate with each other.
ASHOUR, Salim Fathi Salim +2 more
core
Conceptual evidence collection and analysis methodology for Android devices
Android devices continue to grow in popularity and capability meaning the need for a forensically sound evidence collection methodology for these devices also increases. This chapter proposes a methodology for evidence collection and analysis for Android
Al Mutawa +23 more
core +1 more source
The Development of Interactive Learning Media on Android Platform Assisted By Google Sites [PDF]
Afifah Afifah +2 more
openalex +1 more source
Analysis of the development Android’s runtime
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj +1 more source
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates
Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications.
A Mylonas +10 more
core +1 more source
HTTP behavior characteristics generation and extraction approach for Android malware
Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP ...
Yaling LUO, Wenwei LI, Xin SU
doaj +2 more sources
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang +5 more
doaj +1 more source
An Empirical Study on Android-related Vulnerabilities
Mobile devices are used more and more in everyday life. They are our cameras, wallets, and keys. Basically, they embed most of our private information in our pocket.
Bavota, Gabriele +2 more
core +1 more source
Understanding Android Security [PDF]
This paper details a survey of Android users in an attempt to shed light on how users perceive the risks associated with app permissions and in- built adware. A series of questions was presented in a Web survey, with results suggesting interesting differences between males and females in installation be- haviour and attitudes toward security.
Robinson, Gregor, Weir, George
openaire +1 more source
MAMoC-Android: Multisite Adaptive Computation Offloading for Android Applications [PDF]
Computational offloading has been widely used to improve the performance of mobile applications and conserve the energy of mobile devices. Prior studies have primarily focused on a form of offloading where only a single server is considered as the offloading site. However, mobile devices now have access to a range of nearby mobile and fixed devices and
Sulaiman, Dawand Jalil +1 more
openaire +2 more sources

