Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An effective end-to-end android malware detection method
H Zhu, H Wei, L Wang, Z Xu, VS Sheng - Expert Systems with Applications, 2023 - Elsevier
Android has rapidly become the most popular mobile operating system because of its open
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …
source, rich hardware selectivity, and millions of applications (Apps). Meanwhile, the open …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Privacy-aware data publishing and integration for collaborative service recommendation
Item-based collaborative filtering (ie, ICF) technique has been widely recruited to make
service recommendations in the big data environment. However, the ICF technique only …
service recommendations in the big data environment. However, the ICF technique only …
Responding to living-off-the-land tactics using just-in-time memory forensics (JIT-MF) for android
Digital investigations of stealthy attacks on Android devices pose particular challenges to
incident responders. Whereas consequential late detection demands accurate and …
incident responders. Whereas consequential late detection demands accurate and …
Towards Measuring Apps' Privacy-Friendliness
N Momen - 2018 - diva-portal.org
Today's phone could be described as a charismatic tool that has the ability to keep human
beings captivated for a considerable amount of their precious time. Users remain in the …
beings captivated for a considerable amount of their precious time. Users remain in the …
Target: Category-based android malware detection revisited
Smartphones are becoming increasingly popular in daily routines around the world.
However, malware in smartphones is getting more prevalent, and will introduce potential …
However, malware in smartphones is getting more prevalent, and will introduce potential …
[ΒΙΒΛΙΟ][B] Efficient permission-aware analysis of android apps
A Sadeghi - 2018 - search.proquest.com
Permissions are the cornerstone for Android security model, as they enable secure access
to sensitive resources of the phone. Consequently, improper use of Android permission …
to sensitive resources of the phone. Consequently, improper use of Android permission …
Measuring Apps' Privacy-Friendliness: Introducing transparency to apps' data access behavior
N Momen - 2020 - diva-portal.org
Mobile apps brought unprecedented convenience to everyday life, and nowadays, hardly
any interactive service exists without having an interface through an app. The rich …
any interactive service exists without having an interface through an app. The rich …
Quantitave dynamic taint analysis of privacy leakage in android arabic apps
A Youssef, AF Shosha - … of the 12th International Conference on …, 2017 - dl.acm.org
Android smartphones are ubiquitous all over the world, and organizations that turn profits
out of data mining user personal information are on the rise. Many users are not aware of the …
out of data mining user personal information are on the rise. Many users are not aware of the …
PPAndroid-Benchmarker: Benchmarking Privacy Protection Systems on Android Devices
Mobile devices are ubiquitous in today's digital world. While people enjoy the convenience
brought by mobile devices, it has been proven that many mobile apps leak personal …
brought by mobile devices, it has been proven that many mobile apps leak personal …