Artigos de revistas sobre o tema "Android system security"
Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos
Veja os 50 melhores artigos de revistas para estudos sobre o assunto "Android system security".
Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.
Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.
Veja os artigos de revistas das mais diversas áreas científicas e compile uma bibliografia correta.
Jadhav, Atul Chandrakant, e Sunil P. Khachane. "AntiRIG Security System in Android". International Journal of Advanced Research in Computer Science and Software Engineering 7, n.º 6 (30 de junho de 2017): 346–49. http://dx.doi.org/10.23956/ijarcsse/v7i6/0261.
Texto completo da fonteHan, So-Ra, e Mason Noah. "Android Mobile Guardian System Security Architecture for Handset and Data Security". Bonfring International Journal of Industrial Engineering and Management Science 7, n.º 1 (31 de março de 2017): 25–28. http://dx.doi.org/10.9756/bijiems.8323.
Texto completo da fonteLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completo da fonteLe Weng, Le Weng, Chao Feng Le Weng, Zhi-Yuan Shi Chao Feng, Ying-Min Zhang Zhi-Yuan Shi e Lian-Fen Huang Ying-Min Zhang. "FASSFuzzer—An Automated Vulnerability Detection System for Android System Services". 電腦學刊 33, n.º 2 (abril de 2022): 189–200. http://dx.doi.org/10.53106/199115992022043302017.
Texto completo da fonteMarpaung, Ruth Shyintia Rouli. "Android Based Door Security Design". Brilliance: Research of Artificial Intelligence 2, n.º 1 (1 de junho de 2022): 26–30. http://dx.doi.org/10.47709/brilliance.v2i1.1535.
Texto completo da fontePark, Jae-Kyung, e Sang-Yong Choi. "Studying Security Weaknesses of Android System". International Journal of Security and Its Applications 9, n.º 3 (31 de março de 2015): 7–12. http://dx.doi.org/10.14257/ijsia.2015.9.3.02.
Texto completo da fonteHei, Xinhong, Wen Gao, Yichuan Wang, Lei Zhu e Wenjiang Ji. "From Hardware to Operating System: A Static Measurement Method of Android System Based on TrustZone". Wireless Communications and Mobile Computing 2020 (21 de setembro de 2020): 1–13. http://dx.doi.org/10.1155/2020/8816023.
Texto completo da fonteFadjar Bastari, Winarno, e Muhammad Andri Eko Prasetyo. "Locker Security System Design Based On Internet of Things (IoT) Android Interface". BEST : Journal of Applied Electrical, Science, & Technology 3, n.º 2 (15 de setembro de 2021): 30–35. http://dx.doi.org/10.36456/best.vol3.no2.4323.
Texto completo da fonteZulfian Wathoni, Khairunazri e Muh. Fahrurrozi. "Motorcycle Safety System With Android Based Arduino". TEKNIMEDIA: Teknologi Informasi dan Multimedia 1, n.º 2 (5 de janeiro de 2021): 57–63. http://dx.doi.org/10.46764/teknimedia.v1i2.26.
Texto completo da fonteTung, Shu Chu, Wu Jeng Li e Shih Miao Huang. "A Web-Based Android Supervisory Control System". Applied Mechanics and Materials 284-287 (janeiro de 2013): 3211–15. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.3211.
Texto completo da fonteJadhav, Supriya K. "Android based Advance Anti-Theft Security System". International Journal for Research in Applied Science and Engineering Technology V, n.º III (27 de março de 2017): 663–68. http://dx.doi.org/10.22214/ijraset.2017.3124.
Texto completo da fonteReza Khan, Sadeque, e Farzana Sultana Dristy. "Android Based Security and Home Automation System". International Journal of Ambient Systems and Applications 3, n.º 1 (31 de março de 2015): 15–24. http://dx.doi.org/10.5121/ijasa.2014.3102.
Texto completo da fonteHendri, Hendri, e Rosyinta Rosyinta. "Suitcase Security System Using Android and GPS". Jurnal Pendidikan Teknologi Kejuruan 5, n.º 4 (10 de dezembro de 2022): 127–32. http://dx.doi.org/10.24036/jptk.v5i4.32423.
Texto completo da fonteMayrhofer, René, Jeffrey Vander Stoep, Chad Brubaker e Nick Kralevich. "The Android Platform Security Model". ACM Transactions on Privacy and Security 24, n.º 3 (31 de agosto de 2021): 1–35. http://dx.doi.org/10.1145/3448609.
Texto completo da fonteMcVearry, Kenneth A. "DroidChamber: Multilevel Security for Mobile Devices to Support Telemedicine on the Battlefield". Military Medicine 188, Supplement_6 (1 de novembro de 2023): 192–98. http://dx.doi.org/10.1093/milmed/usad084.
Texto completo da fonteLondoño, Sebastián, Christian Urcuqui, Manuel Fuentes Amaya, Johan Gómez e Andrés Navarro Cadavid. "SafeCandy: System for security, analysis and validation in Android". Sistemas y Telemática 13, n.º 35 (3 de dezembro de 2015): 89–102. http://dx.doi.org/10.18046/syt.v13i35.2154.
Texto completo da fonteS.Kom, Ferry Sudarto, Eka Purwandari e Aldien Sora Andrea. "PROTOTIPE PENGONTROLAN PINTU GUNA MENGAMANKAN NASKAH SOAL UJIAN NASIONAL PADA SMA NEGERI 11 TANGERANG". CCIT Journal 11, n.º 1 (20 de fevereiro de 2018): 82–94. http://dx.doi.org/10.33050/ccit.v11i1.561.
Texto completo da fonteHan, Kyoung Soo, Yeoreum Lee, Biao Jiang e Eul Gyu Im. "Android Permission System Violation". International Journal of E-Entrepreneurship and Innovation 4, n.º 1 (janeiro de 2013): 16–27. http://dx.doi.org/10.4018/jeei.2013010102.
Texto completo da fonteAdrianto, Lintang Bagas, Mohammad Iwan Wahyuddin e Winarsih Winarsih. "Implementasi Deep Learning untuk Sistem Keamanan Data Pribadi Menggunakan Pengenalan Wajah dengan Metode Eigenface Berbasis Android". Jurnal JTIK (Jurnal Teknologi Informasi dan Komunikasi) 4, n.º 2 (1 de janeiro de 2021): 89. http://dx.doi.org/10.35870/jtik.v5i1.201.
Texto completo da fonteHidayatullah, Ari, e Yustian Adhi Putra. "Perancangan Sistem Keamanan Perumahan Menggunakan Face Recognition Berbasis Android". Arcitech: Journal of Computer Science and Artificial Intelligence 2, n.º 2 (31 de dezembro de 2022): 87. http://dx.doi.org/10.29240/arcitech.v2i2.5833.
Texto completo da fonteWang, Xin, De Lin Chen, Yue Sun, Xu Wang e Su Ying Yao. "Security Control for TVOS". Applied Mechanics and Materials 643 (setembro de 2014): 136–41. http://dx.doi.org/10.4028/www.scientific.net/amm.643.136.
Texto completo da fonteIzergin, Dmitriy A., Mikhail A. Eremeev, Shamil G. Magomedov e Stanislav I. Smirnov. "Information security evaluation for Android mobile operating system". Russian Technological Journal 7, n.º 6 (10 de janeiro de 2020): 44–55. http://dx.doi.org/10.32362/2500-316x-2019-7-6-44-55.
Texto completo da fonteHartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda e Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android". Journal of Students‘ Research in Computer Science 4, n.º 2 (30 de novembro de 2023): 273–84. http://dx.doi.org/10.31599/2tgt1y85.
Texto completo da fonteIlham, Romi. "Android Application for Parking Management and Security System". Jurnal Riset Ekonomi dan Manajemen 17, n.º 1 (12 de maio de 2017): 1. http://dx.doi.org/10.17970/jrem.17.170101.id.
Texto completo da fonteNiraghatam, Bhaskar. "HEART BEAT MONITORING SYSTEM AND SECURITY USING ANDROID". International Journal of Advanced Research in Computer Science 8, n.º 7 (20 de agosto de 2017): 515–19. http://dx.doi.org/10.26483/ijarcs.v8i7.4347.
Texto completo da fonte., Madhavi Shinde. "SECURITY BASED HOME SURVEILLANCE SYSTEM USING ANDROID APPLICATION". International Journal of Research in Engineering and Technology 03, n.º 04 (25 de abril de 2014): 814–15. http://dx.doi.org/10.15623/ijret.2014.0304143.
Texto completo da fonteM, Gokulnath, e Raagavi G. "Advanced Vehicle Trackiing and Security System using Android". International Journal of Engineering Trends and Technology 36, n.º 7 (25 de junho de 2016): 382–84. http://dx.doi.org/10.14445/22315381/ijett-v36p270.
Texto completo da fontepriya, S. Shanmuga, K. Alagar samy e A. Sara nya. "Android Platform for the Mobile Application Security System". International Journal of Mobile Computing and Application 5, n.º 1 (25 de fevereiro de 2018): 1–8. http://dx.doi.org/10.14445/23939141/ijmca-v5i1p101.
Texto completo da fonteNasution, Torkis, Wilda Susanti, Yandri Armi e Rangga Rahmadian Yuliendi. "Aplikasi Panic Buton Untuk Keamanan Warga Berbasis Android". Edumatic: Jurnal Pendidikan Informatika 6, n.º 1 (19 de junho de 2022): 39–48. http://dx.doi.org/10.29408/edumatic.v6i1.5127.
Texto completo da fonteCotterell, Kathryn, Ian Welch e Aaron Chen. "An Android Security Policy Enforcement Tool". International Journal of Electronics and Telecommunications 61, n.º 4 (1 de dezembro de 2015): 311–20. http://dx.doi.org/10.1515/eletel-2015-0040.
Texto completo da fonteErokhin, Viktor. "Flaws in the Android Permission Protocol with Limited Verification". Voprosy kiberbezopasnosti, n.º 1(41) (2021): 2–17. http://dx.doi.org/10.21681/2311-3456-2021-1-2-17.
Texto completo da fonteHartono, Elvianto Dwi, Agung Kridoyono, Anton Breva Yunanda e Mochamad Sidqon. "Sistem Manajemen Daya Listrik Pada Pengamanan Kendaraan Berbasis Android". Journal of Students‘ Research in Computer Science 4, n.º 2 (30 de novembro de 2023): 273–84. http://dx.doi.org/10.31599/jsrcs.v4i2.3387.
Texto completo da fonteBorysiewicz, Tomasz. "System and hardware security options available for users on devices running Android operating system". Journal of Computer Sciences Institute 8 (30 de novembro de 2018): 220–25. http://dx.doi.org/10.35784/jcsi.684.
Texto completo da fonteDelgado, Raimarius, Jaeho Park, Cheonho Lee e Byoung Wook Choi. "Safe and Policy Oriented Secure Android-Based Industrial Embedded Control System". Applied Sciences 10, n.º 8 (17 de abril de 2020): 2796. http://dx.doi.org/10.3390/app10082796.
Texto completo da fonteJagtap, Akash, Anil Sarwade, Harshal Jhalawat e Mrs R. V. Chaudhari. "Secret Questions based Authentication System for Android Smartphone". International Journal on Recent and Innovation Trends in Computing and Communication 7, n.º 4 (10 de abril de 2019): 01–03. http://dx.doi.org/10.17762/ijritcc.v7i4.5275.
Texto completo da fonteAL-Akhras, Mousa, Abdulrhman ALMohawes, Hani Omar, amer Atawneh e Samah Alhazmi. "Android malicious attacks detection models using machine learning techniques based on permissions". International Journal of Data and Network Science 7, n.º 4 (2023): 2053–76. http://dx.doi.org/10.5267/j.ijdns.2023.8.019.
Texto completo da fonteHamandi, Khodor, Alaa Salman, Imad H. Elhajj, Ali Chehab e Ayman Kayssi. "Messaging Attacks on Android: Vulnerabilities and Intrusion Detection". Mobile Information Systems 2015 (2015): 1–13. http://dx.doi.org/10.1155/2015/746930.
Texto completo da fonteAdharda, Muhammad Akmal, Maman Somantri e Sudjadi Sudjadi. "PERANCANGAN ANTARMUKA SMART SECURITY SYSTEM TAMBAK UDANG BERBASIS ANDROID". Transient: Jurnal Ilmiah Teknik Elektro 10, n.º 1 (17 de março de 2021): 106–13. http://dx.doi.org/10.14710/transient.v10i1.106-113.
Texto completo da fonteStephan, Jane, e Zahra Dhaief. "SMS Encryption by Using Android Operating System". Iraqi Journal for Computers and Informatics 41, n.º 1 (31 de dezembro de 2014): 47–50. http://dx.doi.org/10.25195/ijci.v41i1.97.
Texto completo da fonteLovebbi, Lovebbi, e Dodick Z. Sudirman. "Rancang Bangun Aplikasi Steganografi dengan Metode Least Significant Bit di Audio pada Sistem Operasi Android". Jurnal ULTIMATICS 4, n.º 1 (1 de junho de 2012): 7–16. http://dx.doi.org/10.31937/ti.v4i1.303.
Texto completo da fonteSudakov, A. Yu, e A. V. Sokolov. "DEVELOPMENT OF CLIENT-SERVER APPLICATION SECURITY SYSTEM BASED ON ANDROID OPERATING SYSTEM". INFORMATICS AND MATHEMATICAL METHODS IN SIMULATION 10, n.º 3-4 (2 de dezembro de 2020): 197–207. http://dx.doi.org/10.15276/imms.v10.no3-4.197.
Texto completo da fonteSalve, Nisarg. "Mobile Activity Monitoring System Using Android Spy". INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, n.º 04 (22 de abril de 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30031.
Texto completo da fonteWuryanto, Endro Dwi, e Andi Setiadi. "KENDALI KEAMANAN RUMAH JARAK JAUH BERBASIS RASBERRY DAN ANDROID". JIPETIK:Jurnal Ilmiah Penelitian Teknologi Informasi & Komputer 1, n.º 2 (28 de novembro de 2020): 42–45. http://dx.doi.org/10.26877/jipetik.v1i2.4387.
Texto completo da fontePardhi, Pravin, Chetna D. Dhote, Riteshwari A. Pagote, Suwarna S. Somkuwar e Minakshi P. Dhanorkar. "Smart Wearable System for Women Security using Internet of Things (IoT)". SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 14, n.º 04 (31 de dezembro de 2022): 155–58. http://dx.doi.org/10.18090/samriddhi.v14i04.25.
Texto completo da fonteLiu, Pengju, Guojun Peng e Jing Fang. "A Secure Communication and Access Control Scheme for Native Libraries of Android Applications". Security and Communication Networks 2022 (8 de abril de 2022): 1–12. http://dx.doi.org/10.1155/2022/3923690.
Texto completo da fonteKarthikeyan, Dakshinamoorthy, Arun Sivakumar e Chamundeswari Arumugam. "Android X-Ray - A system for Malware Detection in Android apps using Dynamic Analysis". WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (7 de novembro de 2022): 264–71. http://dx.doi.org/10.37394/23209.2022.19.27.
Texto completo da fonteHutchinson, Shinelle, Miloš Stanković, Samuel Ho, Shiva Houshmand e Umit Karabiyik. "Investigating the Privacy and Security of the SimpliSafe Security System on Android and iOS". Journal of Cybersecurity and Privacy 3, n.º 2 (7 de abril de 2023): 145–65. http://dx.doi.org/10.3390/jcp3020009.
Texto completo da fonteRama, Gilang Aditya, Fauziah Fauziah e Nurhayati Nurhayati. "Perancangan Sistem Keamanan Brangkas Menggunakan Pengenalan Wajah Berbasis Android". JURNAL MEDIA INFORMATIKA BUDIDARMA 4, n.º 3 (20 de julho de 2020): 635. http://dx.doi.org/10.30865/mib.v4i3.2149.
Texto completo da fonteLee, Chanhee, Jonghwa Kim, Seong-je Cho, Jongmoo Choi e Yeongung Park. "Unified security enhancement framework for the Android operating system". Journal of Supercomputing 67, n.º 3 (6 de agosto de 2013): 738–56. http://dx.doi.org/10.1007/s11227-013-0991-y.
Texto completo da fonteRomadhon, A. S. "System Security And Monitoring On Smart Home Using Android". Journal of Physics: Conference Series 953 (janeiro de 2018): 012128. http://dx.doi.org/10.1088/1742-6596/953/1/012128.
Texto completo da fonte