Results 11 to 20 of about 95,083 (206)

ArmorDroid: A Rule-Set Customizable Plugin for Secure Android Application Development

open access: yesInternational Conference on Security and Cryptography, 2023
: Although Android is a popular mobile operating system, its app ecosystem could be safer. The lack of awareness and concern for security issues in apps is one of the main reasons for this.
Cong-Binh Le   +4 more
semanticscholar   +1 more source

Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]

open access: yes, 2018
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios   +2 more
core   +2 more sources

Systematic Mutation-Based Evaluation of the Soundness of Security-Focused Android Static Analysis Techniques [PDF]

open access: yesACM Transactions on Privacy and Security, 2021
Mobile application security has been a major area of focus for security research over the course of the last decade. Numerous application analysis tools have been proposed in response to malicious, curious, or vulnerable apps.
Amit Seal Ami   +4 more
semanticscholar   +1 more source

Android Steganography Application Using Insertion of 4 Bit LSB with Substitution and Vigenere Algorithms

open access: yesJurnal Teknologi dan Sistem Komputer, 2018
This study aims to implement steganography with 4 bit LSB method combined with Vigenere and substitution encryption algorithms. This combination strengthens the security of text messages that are inserted into the image because the message is already a ...
Priyagung Hernawandra   +2 more
doaj   +1 more source

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]

open access: yes, 2019
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven   +16 more
core   +2 more sources

Android Application Security Scanning Process

open access: yesTelecommunications Systems, 2019
This chapter presents the security scanning process for Android applications. The aim is to guide researchers and developers to the core phases/steps required to analyze Android applications, check their trustworthiness, and protect Android users and ...
Iman M. Almomani, Mamdouh Alenezi
semanticscholar   +1 more source

A Deep Learning Method for Android Application Classification Using Semantic Features

open access: yesSecurity and Communication Networks, 2022
Android has become the most popular mobile intelligent operating system with its open platform, diverse applications, and excellent user experience. However, at the same time, more and more attackers take Android as the primary target.
Zhiqiang Wang   +5 more
semanticscholar   +1 more source

Android Kötücül Yazılım Tespit Sistemleri İncelemesi

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
Akıllı telefonların hayatımıza girmesiyle birlikte akıllı telefonları kullanan kullanıcı sayısı her geçen gün artarak devam etmektedir. Akıllı telefonların fazla talep görmesindeki neden, insanların bir cihazla istedikleri işleri tek dokunuşla kolaylıkla
Ömer KİRAZ, İbrahim Alper DOĞRU
doaj   +4 more sources

An Extra Security Measurement for Android Mobile Applications Using the Fingerprint Authentication Methodology

open access: yesJournal of Information Security and Cybercrimes Research, 2023
This research discusses the development of an Android application through the integration of fingerprint recognition technology for user authentication as a way of improving security in the system.
Mohammad Algarni
semanticscholar   +1 more source

Development of A Presence System for Students Using QR Code Based on Android Application

open access: yesEPI International Journal of Engineering, 2022
The Department of Information System at Institut Teknologi B.J. Habibie still physically records each student's attendance by having them sign a presence sheet for each course.
Mar'atuttahirah Mar'atuttahirah   +3 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy