Results 41 to 50 of about 8,962 (209)
Formal Analysis of Android's Permission-Based Security Model [PDF]
In this work we present a comprehensive formal specification of an idealized formulation of Android?s permission model. Permissions in Android are basically tags that developers declare in their applications, more precisely in the so-called application ...
G. Betarte, J. Campo, C. Luna, A. Romano
doaj +1 more source
Teaching Android Mobile Security [PDF]
At present, computer science studies generally offer courses addressing mobile development and they use mobile technologies for illustrating theoretical concepts such as operating system, design patterns, and compilation because Android and iOS use a large variety of technologies for developing applications.
Lalande, Jean-François +6 more
openaire +1 more source
Bridging Optical and Mechanical Metamaterial/Metasurface Realms Toward Integrated Meta‐Systems
This perspective describes the rise of metamaterials in the field of materials science, specifically with optical and mechanical functionality. Fundamentals of both optical and mechanical metamaterials are discussed with a review of state‐of‐the‐art metamaterial science.
Justin Brackenridge +2 more
wiley +1 more source
A general attack model based on Android system vulnerability
Various kinds of vulnerabilities in Android system bring great threats to the platform. The vulnerability exploitation technology,the security of mobile operating systems and the security of Android ecosystem have become a research focus in both industry
Xihai DENG +3 more
doaj +2 more sources
Durch die steigende Leistung der Mobilfunkgeräte finden darauf immer komplexere Applikationen Anwendung. Diese beinhalten immer sensitivere Daten, wie z.B. E-Mail-Konten, Exchange- Zugänge, VPN-Zugänge, etc. Dadurch wird es zunehmend wichtiger die Mobilfunkgeräte besonders zu schützen.
openaire +2 more sources
Security code smells in Android ICC [PDF]
Accepted on 28 Nov 2018, Empirical Software Engineering Journal (EMSE ...
Pascal Gadient +3 more
openaire +3 more sources
Liquid Metal Sensors for Soft Robots
This review thoroughly reviews liquid metal sensors in soft robots. Their unique material properties like high conductivity and good biocompatibility are analyzed. Working principles are classified, and applications in environmental perception, motion detection, and human—robot interaction are introduced.
Qi Zhang +7 more
wiley +1 more source
Security Metrics for the Android Ecosystem [PDF]
© 2015 ACM. The security of Android depends on the timely delivery of updates to fix critical vulnerabilities. In this paper we map the complex network of players in the Android ecosystem who must collaborate to provide updates, and determine that inaction by some manufacturers and network operators means many handsets are vulnerable to critical ...
Thomas, Daniel R. +2 more
openaire +3 more sources
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
A detection method of Android system vulnerabilities based on matching
Android system has occupied the majority share of smart mobile operating systems.However,Android system has worrying security issues.It frequently bursts high-risk vulnerabilities in recent years,which is a big security risk to the majority of Android ...
iayuan ZHANGJ
doaj +2 more sources

