Results 11 to 20 of about 1,117,097 (285)

Android Data-Clone Attack via Operating System Customization [PDF]

open access: goldIEEE Access, 2020
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song   +7 more
openalex   +3 more sources

Information security evaluation for Android mobile operating system

open access: diamondРоссийский технологический журнал, 2020
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control.
Dmitriy A. Izergin   +3 more
openalex   +4 more sources

Android malicious attacks detection models using machine learning techniques based on permissions [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras   +4 more
doaj   +1 more source

Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer

open access: yesPLoS ONE, 2021
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems.
Emad T. Elkabbash   +2 more
doaj   +2 more sources

PAIRED: An Explainable Lightweight Android Malware Detection System

open access: yesIEEE Access, 2022
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
Mohammed M. Alani, Ali Ismail Awad
doaj   +1 more source

Analysis of Remote Access Trojan Attack using Android Debug Bridge

open access: yesIJID (International Journal on Informatics for Development), 2022
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access.
Deco Aprilliansyah, Imam Riadi, Sunardi
doaj   +1 more source

SMS Encryption by Using Android Operating System

open access: yesIraqi Journal for Computers and Informatics, 2014
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunication companies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS)
Jane Stephan, Zahra Dhaief
doaj   +1 more source

System and hardware security options available for users on devices running Android operating system

open access: diamondJournal of Computer Sciences Institute, 2018
Producer of Android operating system have been trying to offer ways to protect digital data on devices since 1st version of this platform. Development of possibilities of operating system and new technological solutions allows to launch more innovate ...
Tomasz Borysiewicz
openalex   +4 more sources

Research on the brand image of iOS and Android smart phone operating systems based on mixed methods

open access: yesFrontiers in Psychology, 2023
IntroductionTo analyze the differences in system functions, interaction behaviors and user experience between iOS and Android smart phone operating system, and then study the differences in their brand images, so as to provide theory and research method ...
Weifeng Hu   +5 more
doaj   +1 more source

Exploitation with Reverse_tcp Method on Android Device using Metasploit

open access: yesJEPIN (Jurnal Edukasi dan Penelitian Informatika), 2019
Android is a popular operating system on smartphone which run on linux kernel. Android operating system allows developers to access and modify source code, but this advantage also increases the security issue.
Rizky Dwiananda Putra, Is Mardianto
doaj   +1 more source

Home - About - Disclaimer - Privacy