Information security evaluation for Android mobile operating system
One of the main directions of information systems development is to increase the efficiency of collecting, processing and exchanging information through the introduction of modern data transfer technologies, automated remote monitoring and control.
Dmitriy A. Izergin +3 more
doaj +1 more source
KLASIFIKASI MALWARE ANDROID DENGAN MENGGUNAKAN METODE CATBOOST ALGORITMA [PDF]
In 2008, Android was introduced as a popular open source project due to its customizability and low hardware requirements. Mid-2021 statistics from GlobalStat Counter shows that Android dominates the mobile operating system market with 72.74%.
IRSYADUDDIN, YUSUF
core
The impace of custom ROM backups on android external storage erasure [PDF]
The Android operating system is the current market leader on mobile devices such as smartphones and tablet computers. The core operating system is open source and has a number of developers creating variants of this operating system.
Hannay, Peter, Hope, Haydon P
core +3 more sources
Research on the brand image of iOS and Android smart phone operating systems based on mixed methods
IntroductionTo analyze the differences in system functions, interaction behaviors and user experience between iOS and Android smart phone operating system, and then study the differences in their brand images, so as to provide theory and research method ...
Weifeng Hu +5 more
doaj +1 more source
Exploitation with Reverse_tcp Method on Android Device using Metasploit
Android is a popular operating system on smartphone which run on linux kernel. Android operating system allows developers to access and modify source code, but this advantage also increases the security issue.
Rizky Dwiananda Putra, Is Mardianto
doaj +1 more source
Aplikasi Peta ATM Dengan Menggunakan Aplikasi GPS Pada Handphone Android [PDF]
Seiring meningkatnya mobilitas masyarakat dan tingginya kebutuhan informasi berupa peta, Geographic Information System (GIS) bukan hanya sekadar tren teknologi, tetapi telah menjadi sebuah kebutuhan.
Purwanto, A. (Adnan) +2 more
core +3 more sources
ANALYSIS OF ANDROID VULNERABILITIES AND MODERN EXPLOITATION TECHNIQUES [PDF]
Android is an operating system based on the Linux kernel. It is the most widely used and popular operating system among Smartphones and portable devices. Its programmable and open nature attracts attackers to take undue advantage. Android platform allows
Himanshu Shewale +3 more
doaj
Information Integrity checking methods for smartphones with Android operating system
The tendency of organizations to use unprotected mobile devices with the Android operating system leads to an increase in incidents with the loss of important information.
Mikhail M. Smotryaev +3 more
doaj +1 more source
Pembuatan Aplikasi Mobile Learning sebagai Sarana Pembelajaran di Lingkungan Universitas Diponegoro
Mobile learning is the intersection of Mobile Computing and E-Learning that provides the resources that can be accessed from anywhere, a powerful search system capabilities, rich interaction, full support for effective learning and assessment based on ...
Afandi Nur Aziz Thohari +2 more
doaj +1 more source
Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution [PDF]
The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance.
Nageen Saleem +4 more
doaj +1 more source

