Results 51 to 60 of about 911,528 (286)
A Method for Automatic Android Malware Detection Based on Static Analysis and Deep Learning
The computers nowadays are being replaced by the smartphones for the most of the internet users around the world, and Android is getting the most of the smartphone systems’ market.
Mulhem Ibrahim +2 more
doaj +1 more source
Security in Pervasive Computing: Current Status and Open Issues [PDF]
Million of wireless device users are ever on the move, becoming more dependent on their PDAs, smart phones, and other handheld devices. With the advancement of pervasive computing, new and unique capabilities are available to aid mobile societies.
Ahamed, Sheikh Iqbal, Haque, Munirul
core +1 more source
Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution [PDF]
Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data.
A Sabelfeld +10 more
core +2 more sources
Here, we present a high‐density PEDOT eutectogel electrode array for enhanced body surface gastric mapping. Silver electrodes are blade‐coated onto flexible substrates, followed by electrogelation of PEDOT:PSS and the deposition of a PEDOT:LS eutectogel.
Christopher Slaughter +8 more
wiley +1 more source
THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core
In this strategy, a conductive nano‐probe is employed to induce nanoscale phase transitions and map the nanoscale conductivity and trap density of GST films. By utilizing the contrasting properties of phase‐change states, nano‐resonators are fabricated that exhibit plasmonic conduction and dramatically different transport characteristics.
Sunwoo Bang +4 more
wiley +1 more source
How Smart is your Android Smartphone? [PDF]
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core +3 more sources
Digital Actuation Control of Soft Robotic Origami With Self‐Folding Liquid Crystal Elastomer Hinges
Self‐folding soft‐rigid hybrid robotic origami is enabled by liquid crystal elastomer actuators with embedded Joule heating and closed‐loop digital control. Digitally addressable hinges provide reversible and programmable transitions between distinct folded states while maintaining actuation performance at high cycle counts (over 1500).
David C. Bershadsky +3 more
wiley +1 more source
Deep Fusion Feature Presentations for Nonaligned Person Re-Identification
Person re-identification aims to retrieve the pedestrian across different cameras. It is still a challenging task for the intelligent visual surveillance system because of similar appearances, camera shooting angles, scene illumination, and pedestrian ...
Meixia Fu +4 more
doaj +1 more source
Automatically Attributing Mobile Threat Actors by Vectorized ATT&CK Matrix and Paired Indicator
During the past decade, mobile attacks have been established as an indispensable attack vector adopted by Advanced Persistent Threat (APT) groups. The ubiquitous nature of the smartphone has allowed users to use mobile payments and store private or ...
Kyoungmin Kim +3 more
doaj +1 more source

