Zobrazeno 1 - 10
of 147
pro vyhledávání: '"Seong-Je Cho"'
Publikováno v:
IEEE Access, Vol 10, Pp 5518-5532 (2022)
It is important to effectively detect, mitigate, and defend against Android malware attacks, because Android malware has long represented a major threat to Android app security. Characterizing and classifying similar malicious apps into groups plays
Externí odkaz:
https://doaj.org/article/e6a90aa4e54a417a8eb0edda6131ce09
Publikováno v:
IEEE Access, Vol 10, Pp 61426-61440 (2022)
Code obfuscation is a technique that makes it difficult for code analyzers to understand a program by transforming its structures or operations while maintaining its original functionality. Android app developers often employ obfuscation techniques t
Externí odkaz:
https://doaj.org/article/ecdb8171680242f0bbec39d6500958fa
Publikováno v:
Applied Sciences, Vol 13, Iss 10, p 6176 (2023)
Vehicle digital forensics includes the process of collecting and analysing digital data stored in vehicles to find evidence related to traffic accidents or crime scenes. Through this process, we can reconstruct digital events by recognizing various i
Externí odkaz:
https://doaj.org/article/e0d66a4fe31d409ea930c39ef6c352e3
Publikováno v:
IEEE Access, Vol 7, Pp 72182-72196 (2019)
There are various types of Android apps, such as entertainment apps, health and fitness apps, travel apps, educational apps, business apps, and so on. Android apps can contain business logic, maintain sensitive personal information, and act as a brid
Externí odkaz:
https://doaj.org/article/0f935cfc9167458592053413b0631739
Publikováno v:
Journal of Internet Services and Information Security, Vol 6, Iss 4, Pp 54-64 (2016)
DEX files are executable files of Android applications. Since DEX files are in the format of Java bytecodes, their Java source codes can be easily obtained using static reverse engineering tools. This results in numerous Android application thefts. T
Externí odkaz:
https://doaj.org/article/20ea2cdc03654a5b840f6b7c87a507d9
Publikováno v:
Journal of Biosystems Engineering. 47:502-509
Publikováno v:
KIISE Transactions on Computing Practices. 28:286-296
Publikováno v:
2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE).
Publikováno v:
2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE).
Publikováno v:
Journal of Software Assessment and Valuation. 17:41-50