DIKUL - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UL. For full access, REGISTER.

1 2 3 4 5
hits: 16,820
1.
  • Rancang bangun game edukasi... Rancang bangun game edukasi fisika berbasis android pada materi suhu dan kalor
    Firdaus, Firdaus; Alrizal; M. Furqon ... Pendipa, 10/2023, Volume: 7, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Penelitian ini bertujuan untuk mengembangkan game edukasi fisika berbasis android pada materi suhu dan kalor menggunakan program konstruk 2, yang dimana permainan dirancang untuk menstimulasi daya ...
Full text
Available for: UL
2.
  • Composite Constant Propagat... Composite Constant Propagation: Application to Android Inter-Component Communication Analysis
    Octeau, Damien; Luchaup, Daniel; Dering, Matthew ... 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1
    Conference Proceeding

    Many program analyses require statically inferring the possible values of composite types. However, current approaches either do not account for correlations between object fields or do so in an ad ...
Full text
Available for: UL
3.
  • Understanding Android App P... Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
    Li Li; Daoyuan Li; Bissyande, Tegawende F. ... IEEE transactions on information forensics and security, 06/2017, Volume: 12, Issue: 6
    Journal Article
    Peer reviewed
    Open access

    The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research ...
Full text
Available for: UL

PDF
4.
  • AATT+: Effectively manifest... AATT+: Effectively manifesting concurrency bugs in Android apps
    Wang, Jue; Jiang, Yanyan; Xu, Chang ... Science of computer programming, 10/2018, Volume: 163
    Journal Article
    Peer reviewed
    Open access

    Smartphones are indispensable in people's daily activities, and smartphone apps tend to be increasingly concurrent due to the wide use of multi-core devices and technologies. Due to this tendency, ...
Full text
Available for: UL
5.
  • Exploring Permission-Induce... Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
    Wang, Wei; Wang, Xing; Feng, Dawei ... IEEE transactions on information forensics and security, 2014-Nov., 2014-11-00, 20141101, Volume: 9, Issue: 11
    Journal Article
    Peer reviewed
    Open access

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android ...
Full text
Available for: UL

PDF
6.
  • MobiGUITAR: Automated Model... MobiGUITAR: Automated Model-Based Testing of Mobile Apps
    Amalfitano, Domenico; Fasolino, Anna Rita; Tramontana, Porfirio ... IEEE software, 2015-Sept.-Oct., 2015-9-00, 20150901, Volume: 32, Issue: 5
    Journal Article
    Peer reviewed

    As mobile devices become increasingly smarter and more powerful, so too must the engineering of their software. User-interface-driven system testing of these devices is gaining popularity, with each ...
Full text
Available for: UL
7.
  • Pengembangan Media Pembelaj... Pengembangan Media Pembelajaran Berbasis Android Pada Materi Limit Fungsi Aljabar
    Nurbani, Nurbani; Puspitasari, Henny Jurnal Educatio FKIP UNMA, 12/2022, Volume: 8, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Latar belakang penelitian yaitu belum adanya media pembelajaran berbasis android pada mata pelajaran Matematika di SMAS 2 Muhammadiyah Pontianak agar siswa dapat belajar secara mandiri. Penelitian ...
Full text
Available for: UL
8.
  • Isolating Host Environment ... Isolating Host Environment by Booting Android from OTG Devices
    Xue, Yuan; Zhang, Xiaosong; Yu, Xiao ... Chinese Journal of Electronics, 20/May , Volume: 27, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    With the integration of smartphone into daily life, end users store a large amount of sensitive information into Android device. For protecting the sensitive information, a method of multi-booting ...
Full text
Available for: UL

PDF
9.
  • GUI-Squatting Attack: Autom... GUI-Squatting Attack: Automated Generation of Android Phishing Apps
    Chen, Sen; Fan, Lingling; Chen, Chunyang ... IEEE transactions on dependable and secure computing, 11/2021, Volume: 18, Issue: 6
    Journal Article

    Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate applications by leveraging repackaging or clone techniques, have caused varied yet significant security concerns. ...
Full text
Available for: UL
10.
  • Android Security: A Survey ... Android Security: A Survey of Issues, Malware Penetration, and Defenses
    Faruki, Parvez; Bharmal, Ammar; Laxmi, Vijay ... IEEE Communications surveys and tutorials, 01/2015, Volume: 17, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, ...
Full text
Available for: UL

PDF
1 2 3 4 5
hits: 16,820

Load filters