70   Artículos

« Anterior     Página: 1 de 4     Siguiente »

 
en línea
Arthur Fournier, Franjieh El Khoury and Samuel Pierre    
The rapid adoption of Android devices comes with the growing prevalence of mobile malware, which leads to serious threats to mobile phone security and attacks private information on mobile devices. In this paper, we designed and implemented a model for m... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Mingwan Kim and Neunghoe Kim    
Application Programming Interface (API) usage mining is an approach used to extract the common API usage to help developers get used to the APIs. However, in Android applications, the usage can be hidden or fragmented due to class inheritance. Such hidde... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Marwa Ziadia, Jaouhar Fattahi, Mohamed Mejri and Emil Pricop    
Today, Android accounts for more than 80% of the global market share. Such a high rate makes Android applications an important topic that raises serious questions about its security, privacy, misbehavior and correctness. Application code analysis is obvi... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hanan Elazhary,Alaa Althubyani,Lina Ahmed,Bayan Alharbi Alharbi,Norah Alzahrani,Reem Almutairi     Pág. pp. 186 - 201
Building context-aware mobile applications is one of the most ambitious areas of research. Such applications can change their behavior according to context or perform specific tasks in specific contexts. Regardless of the application, all context-aware m... ver más

 
en línea
Hosam Farouk El-Sofany,Samir Abou El-Seoud,Hassan M. Alwadani,Amer E. Alwadani     Pág. pp. 4 - 9
Mobile devices have become instruments that allow new ways of interacting with institutional services. This paper describes the development of the Mobile Educational Services Application (MES app) for the Android platform. This app allows access to media... ver más

 
en línea
Catarina Palma, Artur Ferreira and Mário Figueiredo    
The presence of malicious software (malware), for example, in Android applications (apps), has harmful or irreparable consequences to the user and/or the device. Despite the protections app stores provide to avoid malware, it keeps growing in sophisticat... ver más
Revista: Information    Formato: Electrónico

 
en línea
Usman Habib Khan, Muhammad Naeem Ahmed Khan, Aamir Mehmood Mirza, MUHAMMAD AKRAM, Shariqa Fakhar, Shumaila Hussain, Irfan Ahmed Magsi, Raja Asif Wagan     Pág. 63 - 82
Testing of mobile applications (apps) has its quirks as numerous events are required to be tested. Mobile apps testing, being an evolving domain, carries certain challenges that should be accounted for in the overall testing process. Since smartphone app... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Usman Habib Khan, Muhammad Naeem Ahmed Khan, Aamir Mehmood Mirza, MUHAMMAD AKRAM, Shariqa Fakhar, Shumaila Hussain, Irfan Ahmed Magsi, Raja Asif Wagan     Pág. 63 - 82
Testing of mobile applications (apps) has its quirks as numerous events are required to be tested. Mobile apps testing, being an evolving domain, carries certain challenges that should be accounted for in the overall testing process. Since smartphone app... ver más
Revista: Emitter: International Journal of Engineering Technology    Formato: Electrónico

 
en línea
Rosangela Casolare, Fabio Martinelli, Francesco Mercaldo and Antonella Santone    
The Android platform is currently targeted by malicious writers, continuously focused on the development of new types of attacks to extract sensitive and private information from our mobile devices. In this landscape, one recent trend is represented by t... ver más
Revista: Information    Formato: Electrónico

 
en línea
Amr Amin, Amgad Eldessouki, Menna Tullah Magdy, Nouran Abdeen, Hanan Hindy and Islam Hegazy    
Revista: Information    Formato: Electrónico

 
en línea
Jinseong Kim and Im Y. Jung    
Android applications store large amounts of sensitive information that may be exposed and exploited. To prevent this security risk, some applications such as Syrup and KakaoTalk use physical device values to authenticate or encrypt application data. Howe... ver más
Revista: Sustainability    Formato: Electrónico

 
en línea
Pablo CAMPILLO-SÁNCHEZ,Juan Antonio BOTÍA,Jorge GÓMEZ-SANZA     Pág. 23 - 28

 
en línea
Ana Serrano Tellería,Marco Oliveira     Pág. pp. 4 - 14
Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infr... ver más

 
en línea
Mustafa Afandi, Dani Hamdani     Pág. 76 - 85

 
en línea
Musbah Joma Aqel,Omar Naqshbandi,Munsif Yousef Sokiyna,Pertsevoi Valentyn     Pág. pp. 107 - 127
Now, people all over the world use messengers to communicate with their families and employees at work, schedule meetings, congratulate on holidays, and conduct banking operations using bots built into messengers. However, it is challenging to improve su... ver más

 
en línea
Ika Lestari,Arifin Maksum,Cecep Kustandi     Pág. pp. 152 - 171
In facing the industrial era 4.0, the instructional paradigm requires the involvement of technology in it. The use of technology in instructional is sometimes regarded as a medium or tool for delivering information through technology from lecturers to st... ver más

 
en línea
Rasha Abdel sattar El Stohy,Nashaat el Khamessy el Ghetany,Haitham Abdul Menem el Gharib     Pág. pp. 29 - 34
Abstract? There is a remarkable growing interest in utilizing mobile communications to enhance the interactions between different partners in educational institutions, particularly in schools. However, how communicating with parents via applications whil... ver más

 
en línea
Ying-Dar Lin,Chun-Ying Huang     Pág. 157 - 165
Android is one of the most popular operating systems used in mobile devices. Its popularity also renders it a common target for attackers. We propose an efficient and accurate three-phase behavior-based approach for detecting and classifying malicious An... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Fernando Pérez-Rodríguez,João C. Azevedo,María Menéndez-Miguélez     Pág. eRC03
Aim of the study: To introduce and describe ApkFor©, an Android Open-Source Project to generate basic mobile applications to transfer forest growth and yield models for even-aged stands.Material and methods: ApkFor© was developed in Android Studio using ... ver más
Revista: Forest Systems    Formato: Electrónico

 
en línea
Mohammed M. Alani     Pág. pp. 130 - 144
Having a share of over 80% of the smartphone market, Android has become an important mobile operating system that is used by billions of users on daily basis. With the widespread use of smartphones in general, and Android in specific, privacy concerns gr... ver más

« Anterior     Página: 1 de 4     Siguiente »