نتایج جستجو برای: android application

تعداد نتایج: 772242  

Journal: :Comput. Graph. Forum 2014
Mona Hosseinkhani Loorak Philip W. L. Fong M. Sheelagh T. Carpendale

We introduce Papilio, a new visualization technique for visualizing permissions of real-world Android applications. We explore the development of layouts that exploit the directed acyclic nature of Android application permission data to develop a new explicit layout technique that incorporates aspects of set membership, node-link diagrams and matrix layouts. By grouping applications based on se...

2011
Nikhilesh Reddy Jinseong Jeon Jeffrey A. Vaughan Todd Millstein Jeffrey S. Foster

Google’s Android platform uses a fairly standard resource-centric permission model to protect resources such as the camera, GPS, and Internet connection. We claim that a much better permission model for developers and users would be application-centric, with a vocabulary that directly relates to application-level functionality, e.g., one permission could allow camera use, but only for barcode s...

2013
Aisha Ibrahim Ali-Gombe Aisha Ali-Gombe

The pace at which data and information transfer and storage has shifted from PCs to mobile devices is of great concern to the digital forensics community. Android is fast becoming the operating system of choice for these hand-held devices, hence the need to develop better forensic techniques for data recovery cannot be over-emphasized. This thesis analyzes the volatile memory for Motorola Andro...

Journal: :J. Internet Serv. Inf. Secur. 2016
Nak Young Kim Jaewoo Shim Seong-je Cho Minkyu Park Sangchul Han

DEX files are executable files of Android applications. Since DEX files are in the format of Java bytecodes, their Java source codes can be easily obtained using static reverse engineering tools. This results in numerous Android application thefts. There are some tools (e.g. bangcle, ijiami, liapp) that protect Android applications against static reverse engineering utilizing dynamic code loadi...

ژورنال: حیات 2010
خسروی, شهلا, خواجه‌نصیری, فرحناز, ستوده, گیتی, نیازی, الهام, کوهدانی, فریبا,

Background & Objective: It is essential to conduct studies on factors related to obesity in both reproductive ages and menopausal period. The aim of this study was to describe the prevalence of general and android obesity and to assess determinants of overweight in pre- and post-menopausal women. Methods & Materials: In this cross-sectional, random survey of households, about 610 women 20-65 y...

2012
Qiyuan Tian Qingyi Meng

We present a mobile image matching application for Android mobile phone called Virtual Telescope to assist users in viewing distant buildings. The application automatically augments photo's field of view by retrieving replacement images and satellite images from the Internet. The application adopts content based image retrieval method and allow user two choices of feature descriptor, namely Sca...

Journal: :Digital Investigation 2015
Abdullah Talha Kabakus Ibrahim Alper Dogru Aydin Cetin

Android operating system has the highest market share in 2014; making it the most widely used mobile operating system in the world. This fact makes Android users the biggest target group for malware developers. Trend analyses show large increase in mobile malware targeting the Android platform. Android's security mechanism is based on an instrument that informs users about which permissions the...

2003
Ioannis Liabotis Ognjen Prnjat Lionel Sacks

We present the design and implementation of the protocol for efficient resource discovery and job allocation in Application Level Active Network environments. The protocol is fully distributed and is based on the neighbour lists and small world topologies. Protocol is in XML for interoperability and extensibility; and was prototyped and first tested in the context of the ANDROID project thus, t...

2013
Michael J. May Karthikeyan Bhargavan

Android applications that manage sensitive data such as email and files downloaded from cloud storage services need to protect their data from malware installed on the phone. While prior security analyses have focused on protecting system data such as GPS locations from malware, not much attention has been given to the protection of application data. We show that many popular commercial applica...

2014
Sang-Min Seo Yoon-Ho Choi

Existing Android applications for streaming video in real time are dependent on the codec, which composes the encoding function, and the version of Android operating system. Also, for streaming video in real time, most applications should be connected with a separate desktop PC. In this paper, we propose a new application, which overcomes these disadvantages and thus, streams video in real time...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید