Results 161 to 170 of about 95,083 (206)
Two stage malware detection model in internet of vehicles (IoV) using deep learning-based explainable artificial intelligence with optimization algorithms. [PDF]
Alohali MA +7 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Security and Privacy, 2023
The prevalence of malicious Android applications targeting the platform has introduced significant challenges in the realm of security testing. Traditional solutions have proven insufficient in handling the growing number of malicious apps, resulting in ...
Pawan Kumar, Sukhdip Singh
semanticscholar +1 more source
The prevalence of malicious Android applications targeting the platform has introduced significant challenges in the realm of security testing. Traditional solutions have proven insufficient in handling the growing number of malicious apps, resulting in ...
Pawan Kumar, Sukhdip Singh
semanticscholar +1 more source
Android application security: detecting Android malware and evaluating anti-malware software
International Journal of Internet Technology and Secured Transactions, 2020Mobile devices have become widespread computing technology, people prefer to use than desktop devices. These connected devices and their features like an exchange of data, video calling etc.
S. Rani, Dr. Kanwalvir Singh Dhindsa
semanticscholar +1 more source
Time Series Analysis of Copy-and-Paste Impact on Android Application Security
Asia Joint Conference on Information Security, 2018Application developers consider open discussion forum on software development such as question and answer (Q&A) forums to be very important. There are cases where snippets which is partial source code on such forum contains vulnerabilities, and ...
Hironori Imai, Akira Kanaoka
semanticscholar +1 more source
2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2019
With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly ...
Anirban Sarkar +4 more
semanticscholar +1 more source
With the advent of new mobile technologies, the mobile application industry is advancing rapidly. Consisting of several operating systems like symbian OS, iOS, blackberry, etc., Android OS is recognized as the most widely used, popular and user-friendly ...
Anirban Sarkar +4 more
semanticscholar +1 more source
A Study on the Testing of Android Security Patches
IEEE Conference on Communications and Network Security, 2022Android controls the majority of the global OS market. Android Open Source Project (AOSP) is a very complex system with many layers including the apps, the Application Framework, the middle-ware, the customized Linux kernel, and the trusted components ...
Christopher Brant, Tuba Yavuz
semanticscholar +1 more source
Choosing the Weapon: A Comparative Study of Security Analyzers for Android Applications
International Conference on Software Engineering Research and Applications, 2021This study compares security focused static code analyzers for Android applications. Android operated hand-held devices (e.g., smart phones, tablets) are used in the modern computing world for nearly every need.
Ryan B. Joseph +2 more
semanticscholar +1 more source
A Study on Real Time Vehicle Surveillance and Tracking System for Android Application
International Conference on Cryptography, Security and Privacy, 2020A propelled vehicle checking and following framework in light of raspberry pi is planned and actualized for observing the school vehicle from any area A to area B at ongoing.
N. H. reddy +2 more
semanticscholar +1 more source
Assessing the Effectiveness of LLMs in Android Application Vulnerability Analysis
ADIoTThe increasing frequency of attacks on Android applications coupled with the recent popularity of large language models (LLMs) necessitates a comprehensive understanding of the capabilities of the latter in identifying potential vulnerabilities, which is
Vasileios Kouliaridis +2 more
semanticscholar +1 more source

