Results 11 to 20 of about 85,437 (175)

Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]

open access: yes, 2018
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios   +2 more
core   +2 more sources

Android Kötücül Yazılım Tespit Sistemleri İncelemesi

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
Akıllı telefonların hayatımıza girmesiyle birlikte akıllı telefonları kullanan kullanıcı sayısı her geçen gün artarak devam etmektedir. Akıllı telefonların fazla talep görmesindeki neden, insanların bir cihazla istedikleri işleri tek dokunuşla kolaylıkla
Ömer KİRAZ, İbrahim Alper DOĞRU
doaj   +4 more sources

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]

open access: yes, 2019
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven   +16 more
core   +2 more sources

Awareness, habits and behaviors associated with the oral health of children in elementary schools on Kosovo and Metohia [PDF]

open access: yesPraxis Medica, 2015
Oral health is an integral part of the general health of humans and significantly affect the quality of life. Dental caries is today the most widespread disease of our civilization, which if untreated leads to tooth loss.
Mladenović R.   +5 more
doaj   +1 more source

Pengembangan Sistem Piconet Pervasive pada Transmisi Data Rate Video Streaming Melalui Bluetooth

open access: yesJurnal Nasional Teknik Elektro dan Teknologi Informasi, 2017
The purpose of this research is to develop Piconet Pervasive system from previous research that analyzed security system and optimized system performance of video streaming rate data transmission over Bluetooth Piconet Pervasive network, using Symbian OS
Andi Hasad, Abdul Hafid Paronda
doaj   +1 more source

Security Code Smells in Android ICC [PDF]

open access: yes, 2018
Android Inter-Component Communication (ICC) is complex, largely unconstrained, and hard for developers to understand. As a consequence, ICC is a common source of security vulnerability in Android apps.
Frischknecht, Patrick   +3 more
core   +2 more sources

Adaptive secure malware efficient machine learning algorithm for healthcare data

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed   +8 more
wiley   +1 more source

A New Sensors-Based Covert Channel on Android

open access: yesThe Scientific World Journal, 2014
Covert channels are not new in computing systems, and have been studied since their first definition four decades ago. New platforms invoke thorough investigations to assess their security.
Ahmed Al-Haiqi   +2 more
doaj   +1 more source

Precision planter monitoring system based on mobile communication network

open access: yesIET Networks, EarlyView., 2022
Abstract Sowing is an important link in agricultural production and the basis for ensuring high yields and bumper harvests. Agriculture requires precision plows with good performance and stable work. However, the seeding process is in a completely closed state, and the operator relies mainly on experience to judge the operating state and performance of
Bing Li, Jiyun Li
wiley   +1 more source

Quality Assessment Criteria for Mobile Health Apps: A Systematic Review

open access: yesWalailak Journal of Science and Technology, 2019
Summative evidences on the criteria for user assessment of health apps are still limited. In order to determine an assessment method for mobile health apps, rigorously appropriate criteria must be chosen.
Wilasinee HONGSANUN, Suppachai INSUK
doaj   +1 more source

Home - About - Disclaimer - Privacy