Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Research on third-party libraries in android apps: A taxonomy and systematic literature review
Third-party libraries (TPLs) have been widely used in mobile apps, which play an essential
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
part in the entire Android ecosystem. However, TPL is a double-edged sword. On the one …
A formal approach for detection of security flaws in the android permission system
The ever increasing expansion of mobile applications into nearly every aspect of modern
life, from banking to healthcare systems, is making their security more important than ever …
life, from banking to healthcare systems, is making their security more important than ever …
A temporal permission analysis and enforcement framework for android
Permission-induced attacks, ie, security breaches enabled by permission misuse, are
among the most critical and frequent issues threatening the security of Android devices. By …
among the most critical and frequent issues threatening the security of Android devices. By …
Dina: Detecting hidden android inter-app communication in dynamic loaded code
Android inter-app communication (IAC) allows apps to request functionalities from other
apps, which has been extensively used to provide a better user experience. However, IAC …
apps, which has been extensively used to provide a better user experience. However, IAC …
Behaviour analysis of inter-app communication using a lightweight monitoring app for malware detection
M Grace, M Sughasiny - Expert Systems with Applications, 2022 - Elsevier
Smartphone communications are becoming more and more useful for businesses to plan
and organize their work and are mainly operated with android applications. The …
and organize their work and are mainly operated with android applications. The …
Deldroid: an automated approach for determination and enforcement of least-privilege architecture in android
Android is widely used for the development and deployment of autonomous and smart
systems, including software targeted for IoT and mobile devices. Security of such systems is …
systems, including software targeted for IoT and mobile devices. Security of such systems is …
Self-protection of android systems from inter-component communication attacks
The current security mechanisms for Android apps, both static and dynamic analysis
approaches, are insufficient for detection and prevention of the increasingly dynamic and …
approaches, are insufficient for detection and prevention of the increasingly dynamic and …
Flair: efficient analysis of Android inter-component vulnerabilities in response to incremental changes
Inter-component communication (ICC) among Android apps is shown to be the source of
many security vulnerabilities. Prior research has developed compositional analyses to …
many security vulnerabilities. Prior research has developed compositional analyses to …
Efficient, evolutionary security analysis of interacting android apps
In parallel with the increasing popularity of mobile software, an alarming escalation in the
number and sophistication of security threats is observed on mobile platforms, remarkably …
number and sophistication of security threats is observed on mobile platforms, remarkably …
OVERVIEW OF DATA SECURITY, CLASSIFICATION AND CONTROL MEASURE: A STUDY.
M Sharma, H **dal, S Kumar… - I-Manager's Journal on …, 2021 - search.ebscohost.com
Data is a more basic resource for all associations than at any other time in recent memory.
Recent advances and models such as sensor platforms, IoT, distributed computing, and …
Recent advances and models such as sensor platforms, IoT, distributed computing, and …