Results 21 to 30 of about 95,083 (206)

Bringing Balance to the Force: Dynamic Analysis of the Android Application Framework

open access: yesNetwork and Distributed System Security Symposium, 2021
Android's application framework plays a crucial part in protecting users' private data and the system integrity. Consequently, it has been the target of various prior works that analyzed its security policy and enforcement.
Abdallah Dawoud, Sven Bugiel
semanticscholar   +1 more source

Recovering Residual Forensic Data from Smartphone Interactions with Cloud Storage Providers [PDF]

open access: yes, 2015
There is a growing demand for cloud storage services such as Dropbox, Box, Syncplicity and SugarSync. These public cloud storage services can store gigabytes of corporate and personal data in remote data centres around the world, which can then be ...
Amazon Web Services   +53 more
core   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Survey on Blockchain-Based Data Storage Security for Android Mobile Applications

open access: yesItalian National Conference on Sensors, 2023
This research paper investigates the integration of blockchain technology to enhance the security of Android mobile app data storage. Blockchain holds the potential to significantly improve data security and reliability, yet faces notable challenges such
Hussam Saeed Musa   +3 more
semanticscholar   +1 more source

Precision planter monitoring system based on mobile communication network

open access: yesIET Networks, EarlyView., 2022
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley   +1 more source

Mobile Application Security Platforms Survey [PDF]

open access: yes, 2016
Nowadays Smartphone and other mobile devices have become incredibly important in every aspect of our life. Because they have practically offered same capabilities as desktop workstations as well as come to be powerful in terms of CPU (Central processing ...
Amen, Bakhtiar   +2 more
core   +1 more source

Security Hardened and Privacy Preserved Android Malware Detection Using Fuzzy Hash of Reverse Engineered Source Code

open access: yesSecurity and Communication Networks, 2022
The risk of malware has increased drastically in recent years due to advances in the IT industry but it also increased the need for malware analysis and prevention. Hackers inject malicious code using awful applications.
Hasnat Ali   +8 more
semanticscholar   +1 more source

Design and implementation of geographic information system with mobile terminal and 5G network

open access: yesIET Networks, EarlyView., 2022
Abstract Remote insurance mainly completes quotation, insurance application and payment through the PC terminal and mobile terminal, and the premium directly enters the insurance account. This article takes remote insurance as an example. First, it analyses the requirements of the remote insurance and insurance system, and then collects data from the ...
Huijun Xiao, Tangsen Huang, Ensong Jiang
wiley   +1 more source

Android Malware Characterization using Metadata and Machine Learning Techniques [PDF]

open access: yes, 2017
Android Malware has emerged as a consequence of the increasing popularity of smartphones and tablets. While most previous work focuses on inherent characteristics of Android apps to detect malware, this study analyses indirect features and meta-data to ...
Guzmán, Antonio   +3 more
core   +2 more sources

Features requirement elicitation process for designing a chatbot application

open access: yesIET Networks, EarlyView., 2022
This article seeks to assist the chatbot community by outlining the characteristics that a chatbot needs to possess and explaining how to create a chatbot for a bank. In order to determine which capabilities are most crucial to ending users, a study of a small sample of chatbot users was conducted.
Nurul Muizzah Johari   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy