Android science

Results: 263



#Item
51

ODK Tables: Building Easily Customizable Information Applications on Android Devices Waylon Brunette, Samuel Sudar, Nicholas Worden, Dylan Price, Richard Anderson, Gaetano Borriello Department of Computer Science and Eng

Add to Reading List

Source URL: opendatakit.org

Language: English - Date: 2013-02-14 09:58:20
    52

    Android Permissions: A Perspective Combining Risks and Benefits Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru Department of Computer Science and CERIAS, Purdue University 305 N. University

    Add to Reading List

    Source URL: homes.cerias.purdue.edu

    Language: English - Date: 2012-11-05 09:59:25
      53

      From Zygote to Morula: Fortifying Weakened ASLR on Android Byoungyoung Lee† , Long Lu‡ , Tielei Wang† , Taesoo Kim∗ , and Wenke Lee† † School of Computer Science, Georgia Institute of Technology

      Add to Reading List

      Source URL: wenke.gtisc.gatech.edu

      Language: English - Date: 2014-03-13 19:05:57
        54Smartphones / IOS / ITunes / Online music stores / Mobile app / Google Play / App store / Android / IPhone / Appsbar / Opera Mobile Store

        Long Tail or Superstar? An analysis of app adoption on the Android Market Nan Zhong Computer Science, ETH Zurich Switzerland

        Add to Reading List

        Source URL: cocoa.ethz.ch

        Language: English - Date: 2013-06-07 09:51:20
        55

        The Impact of Vendor Customizations on Android Security Lei Wu, Michael Grace, Yajin Zhou, Chiachih Wu, Xuxian Jiang Department of Computer Science North Carolina State University {lwu4, mcgrace, yajin_zhou, cwu10}@ncsu

        Add to Reading List

        Source URL: www.cs.ncsu.edu

        Language: English - Date: 2013-11-14 03:11:39
          56Computing / Software / Computer architecture / Android / Smartphones / Alphabet Inc. / Intent / Mobile app / Google Play / Malware / Computer virus / Couple

          On the Need of Precise Inter-App ICC Classification for Detecting Android Malware Collusions* Karim O. Elish, Danfeng (Daphne) Yao, and Barbara G. Ryder Department of Computer Science Virginia Tech Email: {kelish, danfen

          Add to Reading List

          Source URL: ieee-security.org

          Language: English
          57

          What the App is That? Deception and Countermeasures in the Android User Interface Antonio Bianchi, Jacopo Corbetta, Luca Invernizzi, Yanick Fratantonio, Christopher Kruegel, Giovanni Vigna Department of Computer Science

          Add to Reading List

          Source URL: cs.ucsb.edu

          Language: English - Date: 2015-10-03 19:06:01
            58

            PREC: Practical Root Exploit Containment for Android Devices Tsung-Hsuan Ho, Daniel Dean, Xiaohui Gu, William Enck Department of Computer Science North Carolina State University

            Add to Reading List

            Source URL: dance.csc.ncsu.edu

            Language: English - Date: 2014-03-04 23:24:50
              59

              RULE BASED SYSTEM IMPLEMENTATION IN ANDROID Luca Grazioli, Master degree student in Computer Science University of Milan-Bicocca, Italy 1. Introduction Nowadays ANDROID is the most popular mo

              Add to Reading List

              Source URL: womencourage.acm.org

              Language: English - Date: 2016-02-05 15:45:18
                60

                Understanding Android’s Security Framework William Enck and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory (SIIS) Computer Science and Engineering Department, The Pennsylvania State University

                Add to Reading List

                Source URL: www.sigsac.org

                Language: English - Date: 2008-10-14 16:52:28
                  UPDATE