Results 41 to 50 of about 8,962 (209)

Formal Analysis of Android's Permission-Based Security Model [PDF]

open access: yesScientific Annals of Computer Science, 2016
In this work we present a comprehensive formal specification of an idealized formulation of Android?s permission model. Permissions in Android are basically tags that developers declare in their applications, more precisely in the so-called application ...
G. Betarte, J. Campo, C. Luna, A. Romano
doaj   +1 more source

Teaching Android Mobile Security [PDF]

open access: yesProceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019
At present, computer science studies generally offer courses addressing mobile development and they use mobile technologies for illustrating theoretical concepts such as operating system, design patterns, and compilation because Android and iOS use a large variety of technologies for developing applications.
Lalande, Jean-François   +6 more
openaire   +1 more source

Bridging Optical and Mechanical Metamaterial/Metasurface Realms Toward Integrated Meta‐Systems

open access: yesAdvanced Optical Materials, EarlyView.
This perspective describes the rise of metamaterials in the field of materials science, specifically with optical and mechanical functionality. Fundamentals of both optical and mechanical metamaterials are discussed with a review of state‐of‐the‐art metamaterial science.
Justin Brackenridge   +2 more
wiley   +1 more source

A general attack model based on Android system vulnerability

open access: yesDianxin kexue, 2016
Various kinds of vulnerabilities in Android system bring great threats to the platform. The vulnerability exploitation technology,the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry
Xihai DENG   +3 more
doaj   +2 more sources

Android Security

open access: yes, 2011
Durch die steigende Leistung der Mobilfunkgeräte finden darauf immer komplexere Applikationen Anwendung. Diese beinhalten immer sensitivere Daten, wie z.B. E-Mail-Konten, Exchange- Zugänge, VPN-Zugänge, etc. Dadurch wird es zunehmend wichtiger die Mobilfunkgeräte besonders zu schützen.
openaire   +2 more sources

Security code smells in Android ICC [PDF]

open access: yesEmpirical Software Engineering, 2018
Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE ...
Pascal Gadient   +3 more
openaire   +3 more sources

Liquid Metal Sensors for Soft Robots

open access: yesAdvanced Robotics Research, EarlyView.
This review thoroughly reviews liquid metal sensors in soft robots. Their unique material properties like high conductivity and good biocompatibility are analyzed. Working principles are classified, and applications in environmental perception, motion detection, and human—robot interaction are introduced.
Qi Zhang   +7 more
wiley   +1 more source

Security Metrics for the Android Ecosystem [PDF]

open access: yesProceedings of the 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices, 2015
© 2015 ACM. The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem who must collaborate to provide updates, and determine that inaction by some manufacturers and network operators means many handsets are vulnerable to critical ...
Thomas, Daniel R.   +2 more
openaire   +3 more sources

The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?

open access: yesAdvanced Robotics Research, EarlyView.
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley   +1 more source

A detection method of Android system vulnerabilities based on matching

open access: yesDianxin kexue, 2016
Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android ...
iayuan ZHANGJ
doaj   +2 more sources

Home - About - Disclaimer - Privacy