咨询与建议

限定检索结果

文献类型

  • 6 篇 会议
  • 1 篇 期刊文献

馆藏范围

  • 7 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 6 篇 工学
    • 6 篇 计算机科学与技术...
    • 3 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 仪器科学与技术
    • 1 篇 电气工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 控制科学与工程
    • 1 篇 交通运输工程
    • 1 篇 安全科学与工程
    • 1 篇 网络空间安全
  • 1 篇 理学
    • 1 篇 化学
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...

主题

  • 7 篇 android vulnerab...
  • 1 篇 banking transact...
  • 1 篇 android secure l...
  • 1 篇 data security
  • 1 篇 broken authentic...
  • 1 篇 android things
  • 1 篇 lstm
  • 1 篇 nvd
  • 1 篇 mobile applicati...
  • 1 篇 data storage
  • 1 篇 software vulnera...
  • 1 篇 android operatin...
  • 1 篇 android security
  • 1 篇 software securit...
  • 1 篇 osvdb
  • 1 篇 mobile vulnerabi...
  • 1 篇 vulnerability di...
  • 1 篇 insecure data st...
  • 1 篇 session manageme...
  • 1 篇 security

机构

  • 1 篇 lodz univ techno...
  • 1 篇 indian inst info...
  • 1 篇 univ politecn ma...
  • 1 篇 maulana azad nat...
  • 1 篇 karamanoglu mehm...
  • 1 篇 lodz univ techno...
  • 1 篇 univ nacl loja f...
  • 1 篇 nust 13 jackson ...
  • 1 篇 selcuk univ fac ...
  • 1 篇 universita degli...

作者

  • 1 篇 gamundani attlee
  • 1 篇 morolong mamoqen...
  • 1 篇 hemanth banoth
  • 1 篇 basciftci fatih
  • 1 篇 umasankar
  • 1 篇 vinay mallela da...
  • 1 篇 eleonora losiouk
  • 1 篇 hemanth kumar ma...
  • 1 篇 poniszewska-mara...
  • 1 篇 herrera-loaiza d...
  • 1 篇 ordonez-ordonez ...
  • 1 篇 gencer kerem
  • 1 篇 figueroa-diaz ro...
  • 1 篇 tomar deepak sin...
  • 1 篇 bhunu shava fung...
  • 1 篇 maranda witold
  • 1 篇 elisa braconaro
  • 1 篇 rogozinski lukas...

语言

  • 7 篇 英文
检索条件"主题词=Android Vulnerabilities"
7 条 记 录,以下是1-10 订阅
排序:
The Demonstration of android vulnerabilities
The Demonstration of Android Vulnerabilities
收藏 引用
2024 IEEE International Students' Conference on Electrical, Electronics and Computer Science, SCEECS 2024
作者: Vinay, Mallela David Hemanth Kumar, Mandavyapuram Hemanth, Banoth Tomar, Deepak Singh Maulana Azad National Institute of Technology Department of Computer Science and Engineering Bhopal India
The development of mobile applications is increasing rapidly. Client-server architectures are common in many of these systems. IOS and android are the most commonly used operating systems for the client. Smartphones c... 详细信息
来源: 评论
Time series forecast modeling of vulnerabilities in the android operating system using ARIMA and deep learning methods
收藏 引用
SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS 2021年 30卷 100515-100515页
作者: Gencer, Kerem Basciftci, Fatih Karamanoglu Mehmetbey Univ Vocat Sch Tech Sci Dept Comp Programming Karaman Turkey Selcuk Univ Fac Technol Dept Comp Engn Konya Turkey
Security vulnerability prediction models allow estimation of the number of potential vulnerabilities and evaluation of the risks caused by these vulnerabilities. In particular, for modeling the vulnerabilities that ma... 详细信息
来源: 评论
vulnerabilities in Banking Transactions with Mobile Devices android: A Systematic Literature Review  4th
Vulnerabilities in Banking Transactions with Mobile Devices ...
收藏 引用
4th International Conference on Technology Trends (CITT)
作者: Ordonez-Ordonez, Pablo F. Herrera-Loaiza, Domingo D. Figueroa-Diaz, Roberth Univ Nacl Loja Fac Energia Ave Pio Jaramillo Alvarado La Argelia Loja Ecuador Univ Politecn Madrid ETSI Sistemas Informat Calle Alan Turing S-N Madrid 28031 Spain
This qualitative systematic literature review (SLR) corresponds to the search for vulnerabilities in banking transactions by means of android Intelligent mobile devices and the incidents in the users. In these devices... 详细信息
来源: 评论
A Dataset for Evaluating LLMs Vulnerability Repair Performance in android Applications: Data/Toolset paper  25
A Dataset for Evaluating LLMs Vulnerability Repair Performan...
收藏 引用
Proceedings of the Fifteenth ACM Conference on Data and Application Security and Privacy
作者: Elisa Braconaro Eleonora Losiouk Universita degli Studi di Padova Padua Italy
Automated Program Repair (APR) is a well-established research area that enhances software reliability and security by automatically fixing bugs, reducing manual effort, and accelerating debugging. Despite progress in ... 详细信息
来源: 评论
Security Library for Safe Data Storage on android Platform  20
Security Library for Safe Data Storage on Android Platform
收藏 引用
20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom)
作者: Poniszewska-Maranda, Aneta Rogozinski, Lukasz Maranda, Witold Lodz Univ Technol Inst Informat Technol Lodz Poland Lodz Univ Technol Dept Microelect & Comp Sci Lodz Poland
Smartphones have become an integral part of everyday human life. In addition to the usual activities such as phone calls and text messages, users are increasingly turning to e-banking, e-commerce or healthcare. The An... 详细信息
来源: 评论
Analysis of Latest vulnerabilities in android
Analysis of Latest Vulnerabilities in Android
收藏 引用
International Conference on Advances in Computing, Communications and Informatics (ICACCI)
作者: Umasankar Indian Inst Informat Technol & Management Kerala Knowledge Ctr Software Engn & Project Management Trivandrum Kerala India
Alongside the fast development of new science and innovation, the elements of Smart gadgets like Smart Phones, Smart TV, smart watches smart home appliances, IoT devices etc. turn out to be increasingly powerful and a... 详细信息
来源: 评论
Review of Sensitive Data Leakage through android Applications in a Bring Your Own Device (BYOD) Workplace
Review of Sensitive Data Leakage through Android Application...
收藏 引用
IST-Africa Week Conference (IST-Africa)
作者: Morolong, Mamoqenelo Gamundani, Attlee Bhunu Shava, Fungai NUST 13 Jackson Kaujeua St Windhoek 9000 Namibia
Researchers reveal that personal computers are not exclusively liable to attacks. Mobile devices have become the very best target due to the fact that, they are largely accustomed to performing numerous activities. Em... 详细信息
来源: 评论