Android source code vulnerability detection: a systematic literature review

J Senanayake, H Kalutarage, MO Al-Kadri… - ACM Computing …, 2023 - dl.acm.org
The use of mobile devices is rising daily in this technological era. A continuous and
increasing number of mobile applications are constantly offered on mobile marketplaces to …

Attacks and preventive measures on video surveillance systems: A review

P Vennam, P TC, T BM, YG Kim, PK BN - Applied Sciences, 2021 - mdpi.com
Video surveillance systems are widely deployed with large systems for use in strategic
places such as home security, public transportation, banks, ATM centers, city centers …

Android malware classification based on random vector functional link and artificial Jellyfish Search optimizer

ET Elkabbash, RR Mostafa, SI Barakat - PloS one, 2021 - journals.plos.org
Smartphone usage is nearly ubiquitous worldwide, and Android provides the leading open-
source operating system, retaining the most significant market share and active user …

Android mobile applications vulnerabilities and prevention methods: A review

H Abdullah, SRM Zeebaree - … To Enhance e-learning and Other …, 2021 - ieeexplore.ieee.org
The popularity of mobile applications is rapidly increasing in the age of smartphones and
tablets. Communication, social media, news, sending emails, buying, paying, viewing …

[PDF][PDF] A review and Case Study on android malware: Threat model, attacks, techniques and tools

C Negi, P Mishra, P Chaudhary… - Journal of Cyber …, 2021 - journals.riverpublishers.com
As android devices have increased in number in the past few years, the android operating
system has started dominating the smartphone market. The vast spread of android across all …

You foot the bill! Attacking NFC with passive relays

Y Sun, S Kumar, S He, J Chen… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Imagine when you line up in a store, the person in front of you can make you pay her bill by
using a passive wearable device that forces a scan of your credit card or mobile phones …

Trusted application using biometrics for android environment

N Anbalagan, RAA Helmi… - 2020 16th IEEE …, 2020 - ieeexplore.ieee.org
The age of depending on processing devices has passed, the current life style is more
dependent on continuous connectivity to the cyber space. This requires exceeding …

Artificial intelligence techniques for enhancing smartphone application development on mobile computing

SV Manikanthan, T Padmapriya, A Hussain… - 2020 - learntechlib.org
Abstract Nowadays, Artificial Intelligence is being integrated into the modern innovations,
including mobile, Electronic gadgets and as well as our daily lives. The smartphones are …

Automatic detection for privacy violations in Android Applications

Q Luo, Y Yu, J Liu, A Benslimane - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
While providing significant convenience for people, mobile applications (Apps) bring serious
privacy leakage and invasion threats over certain platforms (eg, Android) due to privacy …

Secure mobile sensor data transfer using asymmetric cryptography algorithms

N Kabir, S Kamal - … Conference on Cyber Warfare and Security …, 2020 - ieeexplore.ieee.org
Mobile sensors are playing a vital role in various applications of a normal day life. Key size
in securing data is an important issue to highlight in mobile sensor data transfer between a …