Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Static analysis of android apps: A systematic literature review
Context Static analysis exploits techniques that parse program source code or bytecode,
often traversing program paths to check some program properties. Static analysis …
often traversing program paths to check some program properties. Static analysis …
A survey of malware detection in Android apps: Recommendations and perspectives for future research
Android has dominated the smartphone market and has become the most popular operating
system for mobile devices. However, security threats in Android applications have also …
system for mobile devices. However, security threats in Android applications have also …
A taxonomy and qualitative comparison of program analysis techniques for security assessment of android software
In parallel with the meteoric rise of mobile software, we are witnessing an alarming
escalation in the number and sophistication of the security threats targeted at mobile …
escalation in the number and sophistication of the security threats targeted at mobile …
Collusive data leak and more: Large-scale threat analysis of inter-app communications
Inter-Component Communication (ICC) provides a message passing mechanism for data
exchange between Android applications. It has been long believed that inter-app ICCs can …
exchange between Android applications. It has been long believed that inter-app ICCs can …
Internal factors, external factors and behavioral intention toward food delivery apps (FDAs)
KSP Ng, J Zhang, JWC Wong, KK Luo - British Food Journal, 2023 - emerald.com
Purpose Food delivery apps (FDAs), as a well-known technology, have been widely
adopted by restaurants and customers. Different from existing studies in this field that mainly …
adopted by restaurants and customers. Different from existing studies in this field that mainly …
Detection of repackaged android malware with code-heterogeneity features
During repackaging, malware writers statically inject malcode and modify the control flow to
ensure its execution. Repackaged malware is difficult to detect by existing classification …
ensure its execution. Repackaged malware is difficult to detect by existing classification …
Leila: formal tool for identifying mobile malicious behaviour
With the increasing diffusion of mobile technologies, nowadays mobile devices represent an
irreplaceable tool to perform several operations, from posting a status on a social network to …
irreplaceable tool to perform several operations, from posting a status on a social network to …
A deep learning system for health care IoT and smartphone malware detection
The use of smart and connected devices, such as Android and Internet of Things (IoT) have
increased exponentially. In the last 10 years, mobiles and IoT devices have surpassed PC's …
increased exponentially. In the last 10 years, mobiles and IoT devices have surpassed PC's …
Identifying mobile inter-app communication risks
Malware collusion is a technique utilized by attackers to evade standard detection. It is a
new threat where two or more applications, appearing benign, communicate to perform a …
new threat where two or more applications, appearing benign, communicate to perform a …
Android inter-app communication threats and detection techniques
With the digital breakthrough, smart phones have become very essential component for
many routine tasks like shop**, paying bills, transferring money, instant messaging …
many routine tasks like shop**, paying bills, transferring money, instant messaging …