DIKUL - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UL. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 16.838
1.
  • Rancang bangun game edukasi... Rancang bangun game edukasi fisika berbasis android pada materi suhu dan kalor
    Firdaus, Firdaus; Alrizal; M. Furqon ... Pendipa, 10/2023, Letnik: 7, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Penelitian ini bertujuan untuk mengembangkan game edukasi fisika berbasis android pada materi suhu dan kalor menggunakan program konstruk 2, yang dimana permainan dirancang untuk menstimulasi daya ...
Celotno besedilo
Dostopno za: UL
2.
  • Composite Constant Propagat... Composite Constant Propagation: Application to Android Inter-Component Communication Analysis
    Octeau, Damien; Luchaup, Daniel; Dering, Matthew ... 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1
    Conference Proceeding

    Many program analyses require statically inferring the possible values of composite types. However, current approaches either do not account for correlations between object fields or do so in an ad ...
Celotno besedilo
Dostopno za: UL
3.
  • Understanding Android App P... Understanding Android App Piggybacking: A Systematic Study of Malicious Code Grafting
    Li Li; Daoyuan Li; Bissyande, Tegawende F. ... IEEE transactions on information forensics and security, 06/2017, Letnik: 12, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    The Android packaging model offers ample opportunities for malware writers to piggyback malicious code in popular apps, which can then be easily spread to a large user base. Although recent research ...
Celotno besedilo
Dostopno za: UL

PDF
4.
  • AATT+: Effectively manifest... AATT+: Effectively manifesting concurrency bugs in Android apps
    Wang, Jue; Jiang, Yanyan; Xu, Chang ... Science of computer programming, 10/2018, Letnik: 163
    Journal Article
    Recenzirano
    Odprti dostop

    Smartphones are indispensable in people's daily activities, and smartphone apps tend to be increasingly concurrent due to the wide use of multi-core devices and technologies. Due to this tendency, ...
Celotno besedilo
Dostopno za: UL
5.
  • Exploring Permission-Induce... Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection
    Wang, Wei; Wang, Xing; Feng, Dawei ... IEEE transactions on information forensics and security, 2014-Nov., 2014-11-00, 20141101, Letnik: 9, Številka: 11
    Journal Article
    Recenzirano
    Odprti dostop

    Android has been a major target of malicious applications (malapps). How to detect and keep the malapps out of the app markets is an ongoing challenge. One of the central design points of Android ...
Celotno besedilo
Dostopno za: UL

PDF
6.
  • MobiGUITAR: Automated Model... MobiGUITAR: Automated Model-Based Testing of Mobile Apps
    Amalfitano, Domenico; Fasolino, Anna Rita; Tramontana, Porfirio ... IEEE software, 2015-Sept.-Oct., 2015-9-00, 20150901, Letnik: 32, Številka: 5
    Journal Article
    Recenzirano

    As mobile devices become increasingly smarter and more powerful, so too must the engineering of their software. User-interface-driven system testing of these devices is gaining popularity, with each ...
Celotno besedilo
Dostopno za: UL
7.
  • Pengembangan Media Pembelaj... Pengembangan Media Pembelajaran Berbasis Android Pada Materi Limit Fungsi Aljabar
    Nurbani, Nurbani; Puspitasari, Henny Jurnal Educatio FKIP UNMA, 12/2022, Letnik: 8, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    Latar belakang penelitian yaitu belum adanya media pembelajaran berbasis android pada mata pelajaran Matematika di SMAS 2 Muhammadiyah Pontianak agar siswa dapat belajar secara mandiri. Penelitian ...
Celotno besedilo
Dostopno za: UL
8.
  • Isolating Host Environment ... Isolating Host Environment by Booting Android from OTG Devices
    Xue, Yuan; Zhang, Xiaosong; Yu, Xiao ... Chinese Journal of Electronics, 20/May , Letnik: 27, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    With the integration of smartphone into daily life, end users store a large amount of sensitive information into Android device. For protecting the sensitive information, a method of multi-booting ...
Celotno besedilo
Dostopno za: UL

PDF
9.
  • GUI-Squatting Attack: Autom... GUI-Squatting Attack: Automated Generation of Android Phishing Apps
    Chen, Sen; Fan, Lingling; Chen, Chunyang ... IEEE transactions on dependable and secure computing, 11/2021, Letnik: 18, Številka: 6
    Journal Article

    Mobile phishing attacks, such as mimic mobile browser pages, masquerade as legitimate applications by leveraging repackaging or clone techniques, have caused varied yet significant security concerns. ...
Celotno besedilo
Dostopno za: UL
10.
  • Android Security: A Survey ... Android Security: A Survey of Issues, Malware Penetration, and Defenses
    Faruki, Parvez; Bharmal, Ammar; Laxmi, Vijay ... IEEE Communications surveys and tutorials, 01/2015, Letnik: 17, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Smartphones have become pervasive due to the availability of office applications, Internet, games, vehicle guidance using location-based services apart from conventional services such as voice calls, ...
Celotno besedilo
Dostopno za: UL

PDF
1 2 3 4 5
zadetkov: 16.838

Nalaganje filtrov