Results 31 to 40 of about 95,083 (206)

Malware detection techniques for mobile devices

open access: yes, 2017
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core   +1 more source

Security Code Smells in Android ICC [PDF]

open access: yes, 2018
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick   +3 more
core   +2 more sources

Security Toolbox for Detecting Novel and Sophisticated Android Malware

open access: yes, 2015
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom   +4 more
core   +1 more source

Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]

open access: yes, 2018
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai   +9 more
core   +2 more sources

How Smart is your Android Smartphone? [PDF]

open access: yes, 2010
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core   +3 more sources

Mobile Application Security Penetration Testing Based on OWASP

open access: yesIOP Conference Series: Materials Science and Engineering, 2020
Evolution of smartphones and smart devices affected one of the most used operating systems on smartphones and smart device is Android. Android growth with fast and affected the growth of applications used by that operating system.
Aide Alanda   +3 more
semanticscholar   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Leveraging Social Engineering Techniques for Ethical Purposes:  An Approach to Develop Fake Android App for Collecting Valuable Data Discreetly

open access: yesWasit Journal of Computer and Mathematics Science
Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities ...
Hussein Abdulkhaleq Saleh alsharya
doaj   +1 more source

Neural-Augmented Static Analysis of Android Communication

open access: yes, 2018
We address the problem of discovering communication links between applications in the popular Android mobile operating system, an important problem for security and privacy in Android.
Abadi Martín   +9 more
core   +1 more source

Mechanotransducing Organic Electrochemical Diode for Crosstalk‐Inhibited Artificial Skin

open access: yesAdvanced Functional Materials, EarlyView.
An innovative approach is presented to a stretchable mechanotransducing diode that unifies rectification and tactile‐sensing functionality. This approach enables to fabricate the diode that maintains a large rectification ratio (5 × 102) at a high operational frequency (100 Hz).
Taeyeong Kim   +7 more
wiley   +1 more source

Home - About - Disclaimer - Privacy