Results 11 to 20 of about 88,470 (265)

SAMADroid: A Novel 3-Level Hybrid Malware Detection Model for Android Operating System [PDF]

open access: goldIEEE Access, 2018
© 2013 IEEE. For the last few years, Android is known to be the most widely used operating system and this rapidly increasing popularity has attracted the malware developer's attention.
Saba Arshad   +5 more
core   +5 more sources

Perancangan Aplikasi Mobile Location Based Service (LBS) Untuk Lokasi Penyewaan Rumah Kos Di Kota Semarang Berbasis Android [PDF]

open access: yesJurnal Teknologi dan Sistem Komputer, 2015
Until now, Diponegoro University has become one of the favorite State Univesity for Senior High school students to continuing education college. During this time existing information of boarding house around the Diponegoro University still conventional ...
Iqbal, M. M. (Maulana)   +2 more
core   +3 more sources

Developing Mobile Learning Applications for Android using Web Services [PDF]

open access: yesInformatică economică, 2010
The evolution of today's mobile devices increases the number of mobile applications developed, and among them the mobile learning applications. Mobile hardware and software platforms allow running of faster and richer applications.
Paul POCATILU
core   +1 more source

SMS Encryption by Using Android Operating System

open access: diamondIraqi Journal for Computers and Informatics, 2014
Mobile phones are the most commonly used devices in today’s scenario. The expanding use of mobile phones, telecommunication companies added feature such as SMS (Short Messaging Service) in order to attract more customers. The Short Messaging Service (SMS)
Jane Stephan, Zahra Dhaief
openalex   +4 more sources

Android malicious attacks detection models using machine learning techniques based on permissions [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras   +4 more
doaj   +1 more source

Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer

open access: yesPLoS ONE, 2021
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-source operating system, retaining the most significant market share and active user population of all open-source operating systems.
Emad T. Elkabbash   +2 more
doaj   +2 more sources

PAIRED: An Explainable Lightweight Android Malware Detection System

open access: yesIEEE Access, 2022
With approximately 2 billion active devices, the Android operating system tops all other operating systems in terms of the number of devices using it. Android has gained wide popularity not only as a smartphone operating system, but also as an operating ...
Mohammed M. Alani, Ali Ismail Awad
doaj   +1 more source

Detection and Prevention of Malware in Android Operating System

open access: diamondMehran University Research Journal of Engineering and Technology, 2021
The Internet is not safe anymore, malware can be discovered anywhere on the Internet. The risk of malware has increased also due to the increasing popularity and use of Smartphones and their underlying cost-free applications. With its great market share,
Kashif Ali Dahri   +2 more
openalex   +4 more sources

Analysis of Remote Access Trojan Attack using Android Debug Bridge

open access: yesIJID (International Journal on Informatics for Development), 2022
The security hole in the android operating system sometimes not realized by users such as malware and exploitation by third parties to remote access.
Deco Aprilliansyah, Imam Riadi, Sunardi
doaj   +1 more source

Android Data-Clone Attack via Operating System Customization

open access: yesIEEE Access, 2020
To avoid the inconvenience of retyping a user's ID and password, most mobile apps now provide the automatic login feature for a better user experience. To this end, auto-login credential is stored locally on the smartphone.
Wenna Song   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy