نتایج جستجو برای: android application
تعداد نتایج: 772242 فیلتر نتایج به سال:
The Android software stack for mobile devices defines and enforces its own security model for apps through its application-layer permissions model. However, at its foundation, Android relies upon the Linux kernel to protect the system from malicious or flawed apps and to isolate apps from one another. At present, Android leverages Linux discretionary access control (DAC) to enforce these guaran...
Android has become the most popular smartphone operating system. This rapidly increasing adoption of Android has resulted in significant increase in the number of malwares when compared with previous years. There exist lots of antimalware programs which are designed to effectively protect the users’ sensitive data in mobile systems from such attacks. In this paper, our contribution is twofold. ...
Accuracy of the radiotherapy requires some routine quality control and dosimetry calculations, which would be done by radiotherapy physicists. Due to the increasing use of computers and simulation software in medical science, as well as trends indicating its continued growth, this study aims to develop a new smart-phone application to perform common radiotherapy-related calculations. Computatio...
With an increasing number of mobile devices like smartphones and tablets, their relevance to users and growing number of available applications, also their field of application widens. For the software quality of mobile applications, the application life cycle the process-related states and state transitions plays an important role. Today’s mobile platforms, like Android, iOS and Windows Phone,...
Revealing security vulnerabilities is one of great challenges for the Android ecosystem. Static analysis is the usual approach of the security analysis for computer software. However, it is undirected and time-consuming for the common static analysis methods to analyze the entire Android application systematically from the main entry point. In order to adapt to the event-driven feature of Andro...
The security of Android has been recently challenged by the discovery of a number of vulnerabilities involving different layers of the Android stack. We argue that such vulnerabilities are largely related to the interplay among layers composing the Android stack. Thus, we also argue that such interplay has been underestimated from a security point-ofview and a systematic analysis of the Android...
Android security has been built upon a permission-based mechanism which restricts accesses of third-party Android applications to critical resources on an Android device. The user must accept the set of permissions an application requires, before proceeding the installation. This process aims to inform the users of the risk of installing and using an application on their device; but most often,...
Malware analysts still need to manually inspect malware samples that are considered suspicious by heuristic rules. They dissect software pieces and look for malware evidence in the code. The increasing number of malicious applications targeting Android devices raises the demand for analyzing them to find where the malcode is triggered when user interacts with them. In this paper a framework to ...
The purpose of the presented software is to help tourists to find their way to legendary locations in Transylvania. The project is composed by a central server, an Android client application and a web client application. The use rs of the Android application have the possibility to read about the legends, listen to audio books and watch videos. The application provides navigation to legend loca...
With increasing dominance of Android Operating System in the field of Mobile Computing Devices, it became the necessity of hour to develop an Android Application having all the required information related to university. Considering all the problems faced by the students while using the website, it led us in exploring various possibilities to provide a better way for accessing all the universit...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید