Results 11 to 20 of about 221,189 (243)
Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio +3 more
core +2 more sources
FRIGMOBILE: APLICATIVO MÓVEL DIRECIONADO AO CONTROLE COMERCIAL E DE ESTOQUES EM REDES FRIGORÍFICAS
Advances in telecommunications, networking technologies and portable devices, makes mobile computing is an emerging paradigm on its ability to interact and distribution of information.
Rodrigo C. Borges +1 more
doaj +1 more source
APLIKASI EDUKASI MENGENAL MAKANAN KHAS KARAWANG UNTUK RAUDHATUL ATHFAL
In the learning process of introducing Karawang special foods, teachers at RA Babussalam Al-Islami use more teacher-centered learning techniques where the teaching methods make children as if they are only listeners in learning, so learning is less ...
Wahyu Arya Pambudi +2 more
doaj +1 more source
A Comprehensive Analysis of the Android Permissions System
Android is one of the most essential and highly used operating systems. Android permissions system is a core security component that offers an access-control mechanism to protect system resources and users’ privacy.
Iman M. Almomani, Aala Al Khayer
doaj +1 more source
A smart voltage and current monitoring system for three phase inverters using an android smartphone application [PDF]
In this paper, a new smart voltage and current monitoring system (SVCMS) technique is proposed. It monitors a three phase electrical system using an Arduino platform as a microcontroller to read the voltage and current from sensors and then wirelessly ...
Al-Rubaye, Mohannad Jabbar Mnati +2 more
core +2 more sources
Analysis of Uapush Malware Infection using Static and Behavior Method on Android [PDF]
This research combines static and behavior analysis to detect malwares on Android system. The analysis process was completed by implementing analysis process on a malware-infected application running on an Android device.
Masduqi, Mohammad Khairul +2 more
core +3 more sources
The rise of obfuscated Android malware and impacts on detection methods [PDF]
The various application markets are facing an exponential growth of Android malware. Every day, thousands of new Android malware applications emerge. Android malware hackers adopt reverse engineering and repackage benign applications with their malicious
Wael F. Elsersy +2 more
doaj +2 more sources
The invention of smartphones has opened a new market for mobile application development. Amateur android app developers often do not possess knowledge of the latest android vulnerabilities and thus create applications with attack surface that hackers ...
Ikram Ul Haq, Tamim Ahmed Khan
doaj +1 more source
Sistem Monitoring Jentik Nyamuk Di Desa Muktiharjo Berbasis Mobile
High dengue fever cases strongly influenced by the behavior of the public them self. Almost most of the territory in urban and rural areas can be considered as potentially endemic.
Arief Puji Eka Prasetya +2 more
doaj +1 more source
Along with the development of technology, some students have left learning with books because it is easier to find knowledge on the internet. But everything listed on the internet is abstract, and not all can be accessed by Android.
Retno Tri Vulandari +1 more
doaj +1 more source

