Results 31 to 40 of about 95,083 (206)
Malware detection techniques for mobile devices
Mobile devices have become very popular nowadays, due to its portability and high performance, a mobile device became a must device for persons using information and communication technologies. In addition to hardware rapid evolution, mobile applications
Amro, Bela
core +1 more source
Security Code Smells in Android ICC [PDF]
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick +3 more
core +2 more sources
Security Toolbox for Detecting Novel and Sophisticated Android Malware
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom +4 more
core +1 more source
Understanding Android Obfuscation Techniques: A Large-Scale Investigation in the Wild [PDF]
In this paper, we seek to better understand Android obfuscation and depict a holistic view of the usage of obfuscation through a large-scale investigation in the wild.
Chen, Kai +9 more
core +2 more sources
How Smart is your Android Smartphone? [PDF]
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core +3 more sources
Mobile Application Security Penetration Testing Based on OWASP
Evolution of smartphones and smart devices affected one of the most used operating systems on smartphones and smart device is Android. Android growth with fast and affected the growth of applications used by that operating system.
Aide Alanda +3 more
semanticscholar +1 more source
Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein +13 more
wiley +1 more source
Social engineering techniques are often viewed negatively due to their association with deceptive practices. However, these techniques can also be utilized ethically, as many cybersecurity professionals do, particularly when evaluating vulnerabilities ...
Hussein Abdulkhaleq Saleh alsharya
doaj +1 more source
Neural-Augmented Static Analysis of Android Communication
We address the problem of discovering communication links between applications in the popular Android mobile operating system, an important problem for security and privacy in Android.
Abadi Martín +9 more
core +1 more source
Mechanotransducing Organic Electrochemical Diode for Crosstalk‐Inhibited Artificial Skin
An innovative approach is presented to a stretchable mechanotransducing diode that unifies rectification and tactile‐sensing functionality. This approach enables to fabricate the diode that maintains a large rectification ratio (5 × 102) at a high operational frequency (100 Hz).
Taeyeong Kim +7 more
wiley +1 more source

