Results 1 to 10 of about 88,858 (288)
Android Data-Clone Attack via Operating System Customization [PDF]
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song +7 more
doaj +2 more sources
SMS Encryption by Using Android Operating System
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunication companies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS)
Jane Stephan, Zahra Dhaief
doaj +3 more sources
Information security evaluation for Android mobile operating system
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control.
Dmitriy A. Izergin +3 more
doaj +3 more sources
GNSS Positioning Using Mobile Devices with the Android Operating System [PDF]
The access and the use of the global navigation satellite system (GNSS) pseudo-range and carrier-phase measurements mobile devices as smartphones and tablets with an Android operating system has transformed the concept of accurate positioning with mobile
Paolo Dabove +2 more
doaj +2 more sources
Android malicious attacks detection models using machine learning techniques based on permissions [PDF]
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras +4 more
doaj +1 more source
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems.
Emad T. Elkabbash +2 more
doaj +2 more sources
PAIRED: An Explainable Lightweight Android Malware Detection System
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
Mohammed M. Alani, Ali Ismail Awad
doaj +1 more source
Analysis of Remote Access Trojan Attack using Android Debug Bridge
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access.
Deco Aprilliansyah, Imam Riadi, Sunardi
doaj +1 more source
Achieving Optional Android Permissions without Operating System Modifications [PDF]
Since the release of the open-source Android operating system in 2009, considerable research has been carried out into various factors affecting the security and privacy of user data. As these devices become more widespread in usage, such as in vehicles with the announcement of Android Auto, the need for users to have control over the data available to
Paul, Greig, Irvine, James
openaire +1 more source
OLSR in Android operating system [PDF]
Optimized Link State Routing protocol, an ad-hoc routing protocol, has been popular in wireless devices running on Linux operating system for quite some time. In this project we have outlined the process of preparing Android devices for ad-hoc networking, a way to overcome limitations of the OS for continuous UDP communication, ensure all devices ...
openaire +1 more source

