Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Jieming Gu"'
Publikováno v:
网络与信息安全学报, Vol 4, Pp 63-68 (2018)
The traditional Android application similarity detection methods have the problem of complex feature extraction and low detecting efficiency.Regarding the issue above,an anti-obfuscation Android application similarity detection method based on API ca
Externí odkaz:
https://doaj.org/article/94f011265265472998dca5b33ef0caa3
Publikováno v:
China Communications. 19:116-128
Publikováno v:
Security and Communication Networks, Vol 2021 (2021)
Near-field communication (NFC) is a set of communication protocols that enable two electronic devices. Its security and reliability are welcomed by mobile terminal manufactures, banks, telecom operators, and third-party payment platforms. Simultaneou
Publikováno v:
Security and Communication Networks.
Android has become the most popular mobile intelligent operating system with its open platform, diverse applications, and excellent user experience. However, at the same time, more and more attackers take Android as the primary target. The applicatio
Publikováno v:
Human Centered Computing ISBN: 9783030374280
HCC
HCC
IPFS (Interplanetary File System) is a peer to peer distributed file system with fast downloading speed and high security. IPFS adopts the storage method of equal-size fragmentation and DHT-based resource search. Through investigation, it is found th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::aaaee5634bc15afd71ca4f8c412d8168
https://doi.org/10.1007/978-3-030-37429-7_60
https://doi.org/10.1007/978-3-030-37429-7_60
Publikováno v:
CCIS
In recent years, attackers use communication defects among different applications to trigger malicious attack behaviors, we name it combination attack of Android applications. Combination attack of Android applications is researched in depth, but the
Publikováno v:
CCIS
With the prosperity of the mobile network technology, the mobile application security flaw problem brought by the increasingly highlight. Android defects of traditional analysis 20 method only analysis is done in a single software. This plays a limit