Results 11 to 20 of about 8,962 (209)

Android malicious attacks detection models using machine learning techniques based on permissions [PDF]

open access: yesInternational Journal of Data and Network Science, 2023
The Android operating system is the most used mobile operating system in the world, and it is one of the most popular operating systems for different kinds of devices from smartwatches, IoT, and TVs to mobiles and cockpits in cars.
Mousa AL-Akhras   +4 more
doaj   +1 more source

Understanding Android Security [PDF]

open access: yes, 2015
This paper details a survey of Android users in an attempt to shed light on how users perceive the risks associated with app permissions and in- built adware. A series of questions was presented in a Web survey, with results suggesting interesting differences between males and females in installation be- haviour and attitudes toward security.
Robinson, Gregor, Weir, George
openaire   +1 more source

Security in Android [PDF]

open access: yesINTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY, 2014
New technologies have always created new areas of concern for information security teams. Usually it provides time for the development of effective security controls. The rapid growth of the smartphone in market and the use of these devices for so many sensitive data have led to the emergence of security threat.
Amritesh Kumar Sharma   +2 more
openaire   +1 more source

Survey on Security of Android SDKs [PDF]

open access: yesJisuanji kexue
Android SDK is a software toolkit used for Android application development.Since a single Android SDK can be integrated into multiple applications,its security implications for the installation ecosystem are chain-like,exposing the Android ecosystem to ...
XU Teng, LIU Luyao, JIANG Haoyu, LUO Chang, LI Heng, YUAN Wei
doaj   +1 more source

A Comprehensive Analysis of the Android Permissions System

open access: yesIEEE Access, 2020
Android is one of the most essential and highly used operating systems. Android permissions system is a core security component that offers an access-control mechanism to protect system resources and users’ privacy.
Iman M. Almomani, Aala Al Khayer
doaj   +1 more source

DroidPortrait: Android Malware Portrait Construction Based on Multidimensional Behavior Analysis

open access: yesApplied Sciences, 2020
Recently, security incidents such as sensitive data leakage and video/audio hardware control caused by Android malware have raised severe security issues that threaten Android users, so thus behavior analysis and detection research researches of ...
Xin Su   +5 more
doaj   +1 more source

Predicting the Impact of Android Malicious Samples via Machine Learning

open access: yesIEEE Access, 2019
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples.
Junyang Qiu   +5 more
doaj   +1 more source

Chidroid: A Mobile Android Application for Log Collection and Security Analysis in Healthcare and IoMT

open access: yesApplied Sciences, 2023
The Internet of Medical Things (IoMT) is a growing trend that has led to the use of connected devices, known as the Internet of Health. The healthcare domain has been a target of cyberattacks, especially with a large number of IoMT devices connected to ...
Stylianos Karagiannis   +4 more
doaj   +1 more source

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

Code security of mobile backup modules on the Android platform

open access: yes网络与信息安全学报, 2017
Since more and more third-party Android applications integrate backup services, the security issues of mobile backup modules are critical. By studying how widely these backup services were being used in the Android applications, the differences of code ...
Jiao LIANG,Wu LIU,Wei-li HAN,Xiao-yang WANG   +2 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy