Results 11 to 20 of about 1,117,097 (285)
Android Data-Clone Attack via Operating System Customization [PDF]
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song +7 more
openalex +3 more sources
Information security evaluation for Android mobile operating system
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control.
Dmitriy A. Izergin +3 more
openalex +4 more sources
Android malicious attacks detection models using machine learning techniques based on permissions [PDF]
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras +4 more
doaj +1 more source
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems.
Emad T. Elkabbash +2 more
doaj +2 more sources
PAIRED: An Explainable Lightweight Android Malware Detection System
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
Mohammed M. Alani, Ali Ismail Awad
doaj +1 more source
Analysis of Remote Access Trojan Attack using Android Debug Bridge
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access.
Deco Aprilliansyah, Imam Riadi, Sunardi
doaj +1 more source
SMS Encryption by Using Android Operating System
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunication companies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS)
Jane Stephan, Zahra Dhaief
doaj +1 more source
System and hardware security options available for users on devices running Android operating system
Producer of Android operating system have been trying to offer ways to protect digital data on devices since 1st version of this platform. Development of possibilities of operating system and new technological solutions allows to launch more innovate ...
Tomasz Borysiewicz
openalex +4 more sources
Research on the brand image of iOS and Android smart phone operating systems based on mixed methods
IntroductionTo analyze the differences in system functions, interaction behaviors and user experience between iOS and Android smart phone operating system, and then study the differences in their brand images, so as to provide theory and research method ...
Weifeng Hu +5 more
doaj +1 more source
Exploitation with Reverse_tcp Method on Android Device using Metasploit
Android is a popular operating system on smartphone which run on linux kernel. Android operating system allows developers to access and modify source code, but this advantage also increases the security issue.
Rizky Dwiananda Putra, Is Mardianto
doaj +1 more source

