X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Conference Proceeding (244) 244
Journal Article (163) 163
Book Chapter (36) 36
Book / eBook (17) 17
Magazine Article (3) 3
Reference (2) 2
Streaming Video (2) 2
Dissertation (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
android (264) 264
malware (149) 149
androids (59) 59
computer science (59) 59
humanoid robots (56) 56
security (56) 56
mobile applications (52) 52
smartphones (52) 52
google (51) 51
machine learning (50) 50
computer science, information systems (47) 47
applications programs (46) 46
static analysis (46) 46
mobile computing (40) 40
computer science, software engineering (37) 37
analysis (35) 35
smart phones (35) 35
spyware (32) 32
operating systems (31) 31
smartphone (31) 31
telecommunications (31) 31
android security (29) 29
maschinelles lernen (29) 29
android malware (28) 28
mobiles gerät (28) 28
software (28) 28
java (27) 27
mobile operating systems (27) 27
malware detection (26) 26
computer security (24) 24
mobile anwendung (24) 24
mobile communication systems (24) 24
computer science, general (23) 23
betriebssystem (22) 22
computer science, theory & methods (22) 22
methods (22) 22
privacy (22) 22
algorithms (20) 20
feature extraction (20) 20
android application (18) 18
application software (18) 18
dynamic analysis (18) 18
mobile devices (18) 18
artificial intelligence (17) 17
classification (17) 17
development (17) 17
software engineering (17) 17
access control (16) 16
computers (16) 16
empirische analyse (16) 16
mobile (16) 16
testing (16) 16
usage (16) 16
computer communication networks (15) 15
mobile apps (15) 15
mobile communication (15) 15
mobile security (15) 15
android malware detection (14) 14
data mining (14) 14
programming (14) 14
quellcode (14) 14
science (14) 14
vulnerability (14) 14
ökosystem (14) 14
data security (13) 13
devices (13) 13
electronic devices (13) 13
engineering, electrical & electronic (13) 13
libraries (13) 13
portable computers (13) 13
reverse engineering (13) 13
safety and security measures (13) 13
apps (12) 12
automation (12) 12
communications engineering, networks (12) 12
context-aware computing (12) 12
electronic data processing (12) 12
engineering (12) 12
apk (11) 11
application software development (11) 11
computer information security (11) 11
computer viruses (11) 11
informatics (11) 11
multi-user (11) 11
permissions (11) 11
semantics (11) 11
software engineering/programming and operating systems (11) 11
android applications (10) 10
computer applications (10) 10
geheimhaltung (10) 10
learning (10) 10
mobile sicherheit (10) 10
mobiltelefon (10) 10
reverse-engineering (10) 10
android studio (9) 9
classifiers (9) 9
development of application software (9) 9
feature selection (9) 9
general (9) 9
installation (9) 9
more...
Library Location Library Location
Language Language
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2015, Volume 9491, pp. 663 - 673
Conference Proceeding
Future generation computer systems, ISSN 0167-739X, 09/2020, Volume 110, pp. 135 - 147
.... First, the proposed methodology decompiles the Android Package Kit files, then API calls, keywords, and non-obfuscated tokens are extracted from the source code... 
Android malware | Source code analysis | Malicious code
Journal Article
Inteonet jeongbo hakoe nonmunji = Journal of Korean Society for Internet Information, ISSN 1598-0170, 2019, Volume 20, Issue 5, p. 9
Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack... 
Forgery Detection | Android Mobile APK | Blockchain | 블록체인 | 검출 DApp | Hyperledger Composer | Detection DApp | 안드로이드 모바일 APK | 위조 판별 | 하이퍼레저 컴포저
Journal Article
01/2019, ISBN 3039210017
This Special Issue provides an opportunity for researchers in the area of side-channel attacks (SCAs) to highlight the most recent exciting technologies. The... 
n/a | binary Huff curve | FPGA | post quantum cryptography | data loss | side-channel cache attacks | rsa cryptosystem | first-order analysis | chaotic circuit | integrity | ad libraries | power-analysis attack | single trace analysis | side-channel authentication | provable security | ad lib | cache misses | cache side-channel attack | leakage model | NTRU | graph | AES | hardware security | recovery of secret exponent by triangular trace analysis | side-channel attacks | information leakage | data outsourcing | CPLD | scatter-gather implementation | modular exponentiation | lattice-based cryptography | elliptic curve cryptography | Gaussian sampling | post-quantum cryptography | reliability | unified point addition | ad networks | graph similarity | mobile ads | physically unclonable function | tweakable block cipher | Merkle (hash) tree | machine-learning classification | side channel attack | online authentication | side channel analysis | financial IC card | side-channel attack | re-keying | cloud computing | cryptographic keys | chaos theory | horizontal collision correlation analysis | countermeasure | embedded system security | cache attack | single-trace attack | software development kit (SDK) | CDT sampling | key bit-dependent attack | side-channel analysis | second-order analysis | constant-time cryptographic algorithm | android package (APK) | challenge-response authentication
eBook
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), ISSN 0302-9743, 2016, Volume 9947, pp. 546 - 554
Conference Proceeding
Proceedings of the 2015 Conference on research in adaptive and convergent systems, 10/2015, pp. 268 - 273
.... The objective of this service is to allow users to learn information about Android application package (APK... 
sandbox | google cloud messaging | machine learning | Google app engine | android malware | Android malware | Google cloud messaging | Machine learning | Sandbox
Conference Proceeding
2016 12th International Conference on Computational Intelligence and Security (CIS), 12/2016, pp. 254 - 258
.... However, existent standard solutions based on Android Package (APK) had shown negative impact to the overall system, especially in behavioral coverage and memory footprint... 
Runtime | automated execution | Humanoid robots | Prototypes | XML | Android applications | traversal | Androids | Security | trusted execution environment | Graphical user interfaces
Conference Proceeding
2017 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 09/2017, Volume 2017-, pp. 1677 - 1683
.... This paper seeks to model a large set of Android permissions particularly the permissions from Normal, Dangerous, Signature and Signature Or System categories within a large number of Android application package (APK... 
recurrent neural network (RNN) | Recurrent neural networks | Humanoid robots | malware detection and classification | Security | APK (application package) | Android | Deep learning | Machine learning | Permissions | long short-term memory (LSTM) | Feature extraction | Malware | Androids | Long short-Term memory (LSTM) | Recurrent neural network (RNN) | Malware detection and classification
Conference Proceeding
Proceedings of the 2014 ACM Workshop on information sharing & collaborative security, ISSN 1543-7221, 11/2014, Volume 2014-, Issue November, pp. 71 - 80
Android Package (APK) analysis is one of the basic processes for risk analysis of Androids... 
data model | information exchange | information sharing | android package | security alert | apk | risk analysis | Data model | Information sharing | Security alert | APK | Risk analysis | Android package | Information exchange
Conference Proceeding
2014 International Conference on Wavelet Analysis and Pattern Recognition, ISSN 2158-5695, 07/2014, pp. 61 - 65
.... This paper proposes a static android malware detection method by using not only the permission but also the package of an Android application... 
Accuracy | Conferences | Humanoid robots | DEX | Permission | Feature extraction | Malware | Package | Androids | APK | Smart phones | Android
Conference Proceeding
2019 International Conference on Intelligent Computing and Control Systems (ICCS), 05/2019, pp. 841 - 845
.... Key features of the proposed work include detection of Android malware even before installation, the name of the Android malware, version packages with proven extremely high accuracy of about 94.65%. This model also learns all features from all combinations of features. It includes extensive research and testing to achieve very high accuracy. 
Vector Representation | Preprocessing | Android Malware Classification | Data Mining | Data Extraction | Security | APK (application package) | Android | Deep learning | Cellular phones | Machine learning | Forestry | Permissions | Feature extraction | Malware | Keras | Behavioral Analysis | Deep Learning Dense Model | Androids | Virus Share | Smart phones | Random Forest Classifier
Conference Proceeding
by Qi Li and Xiaoyu Li
2015 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 09/2015, pp. 84 - 91
.... Current static-analysis practice on Android application package (APK) mainly uses the features such as signature, md5 hash, permissions, data flows, API... 
detection | characteristic-tree | Humanoid robots | dex | android | Malware | Software | static-analysis | dynamic-analysis | Androids | apk | Smart phones | malware | Trees | Platforms | Algorithms | Mathematical analysis | Packages | API | Signatures
Conference Proceeding
Proceedings of the 13th International Conference on mining software repositories, 05/2016, pp. 468 - 471
... community, we also aim at encouraging our fellow researchers to engage in re­producible experiments. Keywords Android Applications, APK, Software Repository 1... 
APK | software repository | android applications | Software repository | Android Applications
Conference Proceeding
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 10/2012, pp. 253 - 256
We present a method of detecting illegally copied Android apps targeting at the APK files... 
illegally copied app | forensic watermarking | Android app | packet sniffing | APK feature point | Forensic watermarking | Packet sniffing | Illegally copied app
Conference Proceeding
2016 11th Asia Joint Conference on Information Security (AsiaJCIS), 08/2016, pp. 141 - 146
.... Examined features include the permissions, Application Programming Interface (API) calls, and meta features such as the category information and Application Package (APK) descriptions... 
Support vector machines | Humanoid robots | Multi-modal Analysis | Feature extraction | Malware | Electronic mail | Androids | APK | Static Analysis | Linear SVM | Android
Conference Proceeding
Proceedings of the 8th International Conference on communication and network security, 11/2018, pp. 69 - 73
With the widespread use of the Android system, the number of malicious Android applications increases sharply. How to effectively identify malware and improve... 
Resource | APK | Android application | Machine learning | Malicious code detection
Conference Proceeding
2015 IEEE International Conference on Progress in Informatics and Computing (PIC), 12/2015, pp. 399 - 403
.... Given an Android application package (APK) file (in bytecode), ABCA inserts commands into the APK file to dump cover-age data on executed classes, method names, and source code statements... 
coverage | Java | Google | Instruments | method | Humanoid robots | line | black-box | Android | Software | Androids | APK | class | Testing | apps | testing | Data buses | Soot | Analyzers | Electronics | Commands | Criteria | Source code | Devices
Conference Proceeding
2015 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2015, 03/2016, pp. 1 - 5
.... An Android application package (APK) is generated automatically to handle this XML file and Sqlite database file and subsequently execute the test cases... 
APK generation | Test automation | Test framework | Android test | Model based testing | Test script generation | Data Driven Architecture | Menutree navigation | Test case generation | Automation | Databases | Conferences | Architecture | Computation | XML | Extensible Markup Language | Handles
Conference Proceeding
09/2016, ISBN 1119089255, 34
... Studio live templates ➤ ➤ Code refactoring in Android Studio ➤ ➤ Updating existing code ➤ ➤ Signing key for Android application in Android Studio ➤ ➤ Building APKs... 
Android Studio tools | code refactoring | Live Templates | APK building utilities | Android Studio menu items
Book Chapter
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.