Journal articles on the topic 'Android system security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Android system security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Jadhav, Atul Chandrakant, and Sunil P. Khachane. "AntiRIG Security System in Android." International Journal of Advanced Research in Computer Science and Software Engineering 7, no. 6 (June 30, 2017): 346–49. http://dx.doi.org/10.23956/ijarcsse/v7i6/0261.
Full textHan, So-Ra, and Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security." Bonfring International Journal of Industrial Engineering and Management Science 7, no. 1 (March 31, 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi, and Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services." 電腦學刊 33, no. 2 (April 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Full textMarpaung, Ruth Shyintia Rouli. "Android Based Door Security Design." Brilliance: Research of Artificial Intelligence 2, no. 1 (June 1, 2022): 26–30. http://dx.doi.org/10.47709/brilliance.v2i1.1535.
Full textPark, Jae-Kyung, and Sang-Yong Choi. "Studying Security Weaknesses of Android System." International Journal of Security and Its Applications 9, no. 3 (March 31, 2015): 7–12. http://dx.doi.org/10.14257/ijsia.2015.9.3.02.
Full textHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone." Wireless Communications and Mobile Computing 2020 (September 21, 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Full textFadjar Bastari, Winarno, and Muhammad Andri Eko Prasetyo. "Locker Security System Design Based On Internet of Things (IoT) Android Interface." BEST : Journal of Applied Electrical, Science, & Technology 3, no. 2 (September 15, 2021): 30–35. http://dx.doi.org/10.36456/best.vol3.no2.4323.
Full textZulfian Wathoni, Khairunazri, and Muh. Fahrurrozi. "Motorcycle Safety System With Android Based Arduino." TEKNIMEDIA: Teknologi Informasi dan Multimedia 1, no. 2 (January 5, 2021): 57–63. http://dx.doi.org/10.46764/teknimedia.v1i2.26.
Full textTung, Shu Chu, Wu Jeng Li, and Shih Miao Huang. "A Web-Based Android Supervisory Control System." Applied Mechanics and Materials 284-287 (January 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Full textJadhav, Supriya K. "Android based Advance Anti-Theft Security System." International Journal for Research in Applied Science and Engineering Technology V, no. III (March 27, 2017): 663–68. http://dx.doi.org/10.22214/ijraset.2017.3124.
Full textReza Khan, Sadeque, and Farzana Sultana Dristy. "Android Based Security and Home Automation System." International Journal of Ambient Systems and Applications 3, no. 1 (March 31, 2015): 15–24. http://dx.doi.org/10.5121/ijasa.2014.3102.
Full textHendri, Hendri, and Rosyinta Rosyinta. "Suitcase Security System Using Android and GPS." Jurnal Pendidikan Teknologi Kejuruan 5, no. 4 (December 10, 2022): 127–32. http://dx.doi.org/10.24036/jptk.v5i4.32423.
Full textMayrhofer, René, Jeffrey Vander Stoep, Chad Brubaker, and Nick Kralevich. "The Android Platform Security Model." ACM Transactions on Privacy and Security 24, no. 3 (August 31, 2021): 1–35. http://dx.doi.org/10.1145/3448609.
Full textMcVearry, Kenneth A. "DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield." Military Medicine 188, Supplement_6 (November 1, 2023): 192–98. http://dx.doi.org/10.1093/milmed/usad084.
Full textLondoño, Sebastián, Christian Urcuqui, Manuel Fuentes Amaya, Johan Gómez, and Andrés Navarro Cadavid. "SafeCandy: System for security, analysis and validation in Android." Sistemas y Telemática 13, no. 35 (December 3, 2015): 89–102. http://dx.doi.org/10.18046/syt.v13i35.2154.
Full textS.Kom, Ferry Sudarto, Eka Purwandari, and Aldien Sora Andrea. "PROTOTIPE PENGONTROLAN PINTU GUNA MENGAMANKAN NASKAH SOAL UJIAN NASIONAL PADA SMA NEGERI 11 TANGERANG." CCIT Journal 11, no. 1 (February 20, 2018): 82–94. http://dx.doi.org/10.33050/ccit.v11i1.561.
Full textHan, Kyoung Soo, Yeoreum Lee, Biao Jiang, and Eul Gyu Im. "Android Permission System Violation." International Journal of E-Entrepreneurship and Innovation 4, no. 1 (January 2013): 16–27. http://dx.doi.org/10.4018/jeei.2013010102.
Full textAdrianto, Lintang Bagas, Mohammad Iwan Wahyuddin, and Winarsih Winarsih. "Implementasi Deep Learning untuk Sistem Keamanan Data Pribadi Menggunakan Pengenalan Wajah dengan Metode Eigenface Berbasis Android." Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, no. 2 (January 1, 2021): 89. http://dx.doi.org/10.35870/jtik.v5i1.201.
Full textHidayatullah, Ari, and Yustian Adhi Putra. "Perancangan Sistem Keamanan Perumahan Menggunakan Face Recognition Berbasis Android." Arcitech: Journal of Computer Science and Artificial Intelligence 2, no. 2 (December 31, 2022): 87. http://dx.doi.org/10.29240/arcitech.v2i2.5833.
Full textWang, Xin, De Lin Chen, Yue Sun, Xu Wang, and Su Ying Yao. "Security Control for TVOS." Applied Mechanics and Materials 643 (September 2014): 136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.643.136.
Full textIzergin, Dmitriy A., Mikhail A. Eremeev, Shamil G. Magomedov, and Stanislav I. Smirnov. "Information security evaluation for Android mobile operating system." Russian Technological Journal 7, no. 6 (January 10, 2020): 44–55. http://dx.doi.org/10.32362/2500-316x-2019-7-6-44-55.
Full textHartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda, and Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android." Journal of Students‘ Research in Computer Science 4, no. 2 (November 30, 2023): 273–84. http://dx.doi.org/10.31599/2tgt1y85.
Full textIlham, Romi. "Android Application for Parking Management and Security System." Jurnal Riset Ekonomi dan Manajemen 17, no. 1 (May 12, 2017): 1. http://dx.doi.org/10.17970/jrem.17.170101.id.
Full textNiraghatam, Bhaskar. "HEART BEAT MONITORING SYSTEM AND SECURITY USING ANDROID." International Journal of Advanced Research in Computer Science 8, no. 7 (August 20, 2017): 515–19. http://dx.doi.org/10.26483/ijarcs.v8i7.4347.
Full text., Madhavi Shinde. "SECURITY BASED HOME SURVEILLANCE SYSTEM USING ANDROID APPLICATION." International Journal of Research in Engineering and Technology 03, no. 04 (April 25, 2014): 814–15. http://dx.doi.org/10.15623/ijret.2014.0304143.
Full textM, Gokulnath, and Raagavi G. "Advanced Vehicle Trackiing and Security System using Android." International Journal of Engineering Trends and Technology 36, no. 7 (June 25, 2016): 382–84. http://dx.doi.org/10.14445/22315381/ijett-v36p270.
Full textpriya, S. Shanmuga, K. Alagar samy, and A. Sara nya. "Android Platform for the Mobile Application Security System." International Journal of Mobile Computing and Application 5, no. 1 (February 25, 2018): 1–8. http://dx.doi.org/10.14445/23939141/ijmca-v5i1p101.
Full textNasution, Torkis, Wilda Susanti, Yandri Armi, and Rangga Rahmadian Yuliendi. "Aplikasi Panic Buton Untuk Keamanan Warga Berbasis Android." Edumatic: Jurnal Pendidikan Informatika 6, no. 1 (June 19, 2022): 39–48. http://dx.doi.org/10.29408/edumatic.v6i1.5127.
Full textCotterell, Kathryn, Ian Welch, and Aaron Chen. "An Android Security Policy Enforcement Tool." International Journal of Electronics and Telecommunications 61, no. 4 (December 1, 2015): 311–20. http://dx.doi.org/10.1515/eletel-2015-0040.
Full textErokhin, Viktor. "Flaws in the Android Permission Protocol with Limited Verification." Voprosy kiberbezopasnosti, no. 1(41) (2021): 2–17. http://dx.doi.org/10.21681/2311-3456-2021-1-2-17.
Full textHartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda, and Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android." Journal of Students‘ Research in Computer Science 4, no. 2 (November 30, 2023): 273–84. http://dx.doi.org/10.31599/jsrcs.v4i2.3387.
Full textBorysiewicz, Tomasz. "System and hardware security options available for users on devices running Android operating system." Journal of Computer Sciences Institute 8 (November 30, 2018): 220–25. http://dx.doi.org/10.35784/jcsi.684.
Full textDelgado, Raimarius, Jaeho Park, Cheonho Lee, and Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System." Applied Sciences 10, no. 8 (April 17, 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Full textJagtap, Akash, Anil Sarwade, Harshal Jhalawat, and Mrs R. V. Chaudhari. "Secret Questions based Authentication System for Android Smartphone." International Journal on Recent and Innovation Trends in Computing and Communication 7, no. 4 (April 10, 2019): 01–03. http://dx.doi.org/10.17762/ijritcc.v7i4.5275.
Full textAL-Akhras, Mousa, Abdulrhman ALMohawes, Hani Omar, amer Atawneh, and Samah Alhazmi. "Android malicious attacks detection models using machine learning techniques based on permissions." International Journal of Data and Network Science 7, no. 4 (2023): 2053–76. http://dx.doi.org/10.5267/j.ijdns.2023.8.019.
Full textHamandi, Khodor, Alaa Salman, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. "Messaging Attacks on Android: Vulnerabilities and Intrusion Detection." Mobile Information Systems 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/746930.
Full textAdharda, Muhammad Akmal, Maman Somantri, and Sudjadi Sudjadi. "PERANCANGAN ANTARMUKA SMART SECURITY SYSTEM TAMBAK UDANG BERBASIS ANDROID." Transient: Jurnal Ilmiah Teknik Elektro 10, no. 1 (March 17, 2021): 106–13. http://dx.doi.org/10.14710/transient.v10i1.106-113.
Full textStephan, Jane, and Zahra Dhaief. "SMS Encryption by Using Android Operating System." Iraqi Journal for Computers and Informatics 41, no. 1 (December 31, 2014): 47–50. http://dx.doi.org/10.25195/ijci.v41i1.97.
Full textLovebbi, Lovebbi, and Dodick Z. Sudirman. "Rancang Bangun Aplikasi Steganografi dengan Metode Least Significant Bit di Audio pada Sistem Operasi Android." Jurnal ULTIMATICS 4, no. 1 (June 1, 2012): 7–16. http://dx.doi.org/10.31937/ti.v4i1.303.
Full textSudakov, A. Yu, and A. V. Sokolov. "DEVELOPMENT OF CLIENT-SERVER APPLICATION SECURITY SYSTEM BASED ON ANDROID OPERATING SYSTEM." INFORMATICS AND MATHEMATICAL METHODS IN SIMULATION 10, no. 3-4 (December 2, 2020): 197–207. http://dx.doi.org/10.15276/imms.v10.no3-4.197.
Full textSalve, Nisarg. "Mobile Activity Monitoring System Using Android Spy." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 22, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30031.
Full textWuryanto, Endro Dwi, and Andi Setiadi. "KENDALI KEAMANAN RUMAH JARAK JAUH BERBASIS RASBERRY DAN ANDROID." JIPETIK:Jurnal Ilmiah Penelitian Teknologi Informasi & Komputer 1, no. 2 (November 28, 2020): 42–45. http://dx.doi.org/10.26877/jipetik.v1i2.4387.
Full textPardhi, Pravin, Chetna D. Dhote, Riteshwari A. Pagote, Suwarna S. Somkuwar, and Minakshi P. Dhanorkar. "Smart Wearable System for Women Security using Internet of Things (IoT)." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, no. 04 (December 31, 2022): 155–58. http://dx.doi.org/10.18090/samriddhi.v14i04.25.
Full textLiu, Pengju, Guojun Peng, and Jing Fang. "A Secure Communication and Access Control Scheme for Native Libraries of Android Applications." Security and Communication Networks 2022 (April 8, 2022): 1–12. http://dx.doi.org/10.1155/2022/3923690.
Full textKarthikeyan, Dakshinamoorthy, Arun Sivakumar, and Chamundeswari Arumugam. "Android X-Ray - A system for Malware Detection in Android apps using Dynamic Analysis." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (November 7, 2022): 264–71. http://dx.doi.org/10.37394/23209.2022.19.27.
Full textHutchinson, Shinelle, Miloš Stanković, Samuel Ho, Shiva Houshmand, and Umit Karabiyik. "Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS." Journal of Cybersecurity and Privacy 3, no. 2 (April 7, 2023): 145–65. http://dx.doi.org/10.3390/jcp3020009.
Full textRama, Gilang Aditya, Fauziah Fauziah, and Nurhayati Nurhayati. "Perancangan Sistem Keamanan Brangkas Menggunakan Pengenalan Wajah Berbasis Android." JURNAL MEDIA INFORMATIKA BUDIDARMA 4, no. 3 (July 20, 2020): 635. http://dx.doi.org/10.30865/mib.v4i3.2149.
Full textLee, Chanhee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi, and Yeongung Park. "Unified security enhancement framework for the Android operating system." Journal of Supercomputing 67, no. 3 (August 6, 2013): 738–56. http://dx.doi.org/10.1007/s11227-013-0991-y.
Full textRomadhon, A. S. "System Security And Monitoring On Smart Home Using Android." Journal of Physics: Conference Series 953 (January 2018): 012128. http://dx.doi.org/10.1088/1742-6596/953/1/012128.
Full text