• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 377
  • 230
  • 194
  • 83
  • 42
  • 26
  • 20
  • 19
  • 11
  • 8
  • 7
  • 7
  • 5
  • 5
  • 5
  • Tagged with
  • 1131
  • 347
  • 330
  • 210
  • 208
  • 176
  • 141
  • 126
  • 124
  • 122
  • 113
  • 98
  • 97
  • 97
  • 94
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Tweet analysis for Android malware detection in Google Play Store

Fan, Zhiang January 1900 (has links)
Master of Science / Department of Computer Science / Major Professor Not Listed / There are many approaches to detect if an app is malware or benign, for example, using static or dynamic analysis. Static analysis can be used to look for APIs that are indicative of malware. Alternatively, emulating the app’s behavior using dynamic analysis can also help in detecting malware. Each type of approach has advantages and disadvantages. To complement existing approaches, in this report, I studied the use of Twitter data to identify malware. The dataset that I used consists of a large set of Android apps made available by AndroZoo. For each app, AndroZoo provides information on vt detection, which records number of anti-virus programs in VirusTotal that label the app as malware. As an additional source of information about apps, I crawled a large set of tweets and analyzed them to identify patterns of malware and benign apps in Twitter. Tweets were crawled based on keywords related to Google Play Store app links. A Google Play Store app link contains the corresponding app’s ID, which makes it easy to link tweets to apps. Certain fields of the tweets were analyzed by comparing patterns in malware versus benign apps, with the goal of identifying fields that are indicative of malware behavior. The classification label from AndroZoo was considered as ground truth.
52

Fleet management system

Challa, Abhishek January 1900 (has links)
Master of Science / Department of Computer Science / Daniel Andresen / Web services have become quintessential in web application development. RESTful web services are one way of providing interoperability between computer systems on the internet. REST-compliant web services allow requesting systems to access and manipulate textual representations of web resources using a uniform and predefined set of stateless operations. These services, which are online APIs, can be accessed from various applications and the results can be used to offer specific functionality to users. This project consists of an Android app, a Server application and a Client application. The Server application exposes a REST API (Web Services developed using REpresentational State Transfer (REST) protocol) using, which the consuming client applications can make use of various functionalities as services across the network. The Android app would be installed in the smart phone present in each vehicle of the fleet, this app would send live location data to the database using the REST API. The manager uses the client application to track the vehicles in real time, the manager can also choose to track a particular vehicle. The API could also be used to integrate the services with other systems. This project serves to a wide variety of users, from small local businesses owning tens or hundreds of vehicle to parents who would like to track the location of their children in real time. This project aims to help the managers/owners better control and track the vehicles. Also, the exposed API could be used by other developers to customize or extend this application. This project is easy to install, use and hence friendly for users with even minimal computer skills.
53

Vidareutveckling av ett Android-spel

Roxbo, Daniel January 2016 (has links)
Rapporten behandlar en vidareutveckling av ett kartbaserat Android-spel där vidareutvecklingen moderniserar koden, implementerar ny funktionalitet och optimerar spelets prestanda. Vid kodmoderniseringen identifieras 8 föråldrade API-användningar som bytts ut under arbetets gång. Prestandamässigt sänks arbetsbördan vilket gör att enheten snabbare kan generera bildrutor. Minneskonsumtionen för spelet minskas med nästan 40% under delar av spelet. Flera nya funktioner implementeras och presenteras vilket tar spelet närmare ett lanseringsklart stadie.
54

Open source application development for phenotypical data acquisition

Courtney, Chaney Lee January 1900 (has links)
Master of Science / Department of Computing and Information Sciences / Mitchell L. Neilsen / The Poland Lab at Kansas State University studies the genetics of wheat ‘to develop a climate-resilient wheat variety that can combat rising heat and drought.’ With populations and food demand rising the need for accelerated food growth is imminent. A previous group of Android applications, Field book has shown that the use of open source app development could create a segue to increasing food development through modernized plant breeding across the world. This is especially useful to various countries that may have a limited budget and have a rising market for Android mobile devices. The applications described in this report include: Verify, a barcode scanning application that can quickly confirm if various seed identifiers are found within a database, Field Mapping, an application that identifies individual plot segments throughout farmland and finally, Survey, an application for manual input of latitude and longitude data. These three applications and services open a new open-source domain for acquisition of data on farmlands to accompany the research of plant breeders.
55

Materiales educativos basados en la Realidad Aumentada y su influencia en el Rendimiento Académico de los estudiantes con discapacidad intelectual en el Centro Educativo Básico especial "Señor de los Milagros"

Ramirez Huaccho, Jefferson Fredy 11 July 2016 (has links)
La presente investigación se realizó en el Centro Educativo Básico Especial “Señor de los Milagros” durante el periodo comprendido del mes de Octubre del 2015 a Enero del 2016 y en la misma participaron los alumnos con discapacidad intelectual moderada, tomando como parámetro de medición las calificaciones de los alumnos evaluados, de allí el propósito de la presente investigación consistió en determinar la influencia de los materiales educativos basada en tecnología de la Realidad Aumentada en el rendimiento de los estudiantes de esta institución mencionada. Para ello fue necesario determinar la diferencia en el rendimiento de los alumnos que utilizan materiales educativos basados en RA frente a los alumnos que utilizan materiales educativos tradicionales y se determinó el nivel de aceptación de los materiales educativos basados en Realidad Aumentada utilizados por los alumnos. El presente investigación se justificó por poseer valor teórico, relevancia social y en base a los beneficios que genera. Metodológicamente el trabajo de investigación se aborda desde la perspectiva de los tipos de estudio aplicada, con la aplicación de un diseño de instigación experimental y la técnica empleada fue la de observación en la cual se aplicó lista de cotejo y escala de valoración validado por el juicio del profesor experto. El procesamiento de datos permitió determinar que el rendimiento de los alumnos incremento 42.8% de estudiantes aprobados. Lo que permitió llegar a la conclusión que se logró mejorar el rendimiento académico de los alumnos, mediante la usabilidad y accesibilidad de los materiales educativos basados en RA e impulsando la enseñanza mediante la motivación que generan estos dispositivos y tecnológicos. / Tesis
56

A Comparison of the Usability of Security Mechanisms Provided by iOS and Android

Maulick, David E 01 June 2018 (has links)
The Open Web Application Security Project identifies that the number one vulnerability in mobile applications is the misuse of platform-provided security mechanisms. This means that platforms like iOS and Android, which now account for 99.8\% of the mobile phone market, are providing mechanisms that are consistently being used in an incorrect manner. This statistic shines a spotlight onto both platforms. Why is it that so many people are misusing platform provided security mechanisms? And is it the platform’s fault? The supposition of this paper is that both iOS and Android are not creating usable security mechanisms. This paper is meant to be a direct response to the number one spot on the OWASP Top Ten Mobile Vulnerabilities list. As a result, our primary goal is to identify whether or not iOS and Android are creating usable security mechanisms. To do this we first proposed an evaluation framework that is tailored to evaluate the usability of mobile device security mechanisms. Then we used it to evaluate seven of the most important and therefore most popular security mechanisms provided by iOS and Android. Through this evaluation we not only hope to develop a clear landscape of overall mobile security mechanism usability, but we also hope to compare the usability across the two platforms. Overall, it was found that both platforms adequately supported the more popular security mechanisms like key storage and HTTPS. Whereas support for some of the more low-level mechanisms, like encryption and MACs, were often neglected. Such neglect could be seen in a number of different ways; however, the most common neglect came in the form of old documentation, or APIs that are long over do for a rebuild or increased abstraction. Furthermore, both platforms barely addressed the testing of implementations, despite the fact that testing is arguably the most important part of the software development cycle. Both iOS and Android seldom gave the developer any guidance on verifying the functionality of their implementations.
57

Řízení kolejového provozu mobilním zařízením

Mařík, Miroslav January 2017 (has links)
Mařík, M. Driving in a mobile device. Diploma thesis. Brno: Mendel University in Brno, 2017. The text describes the development of a mobile application used to driving vehicles in the laboratory of rail traffic control.
58

Open-source mobilná a webová aplikacia pre elektronickú evidenciu tržieb

Osuský, Peter January 2019 (has links)
The text describes the process of designing and developing mobile applications for electronic sales records. The work also describes the procedure of electronic registration and also contains an analysis of existing solutions.
59

EARLY DETECTION OF INTRUSIONS AND MALWARE FOR LINUX BASED SYSTEMS

Xinrun Zhang (9856295) 08 March 2021 (has links)
<p>The system call based research for host intrusion detection systems (HIDSs) and Android malware detection systems (AMDSs) have been conducted over the past several years. Several HIDS and AMDS frameworks have been proposed using different intrusion and malware datasets. Security researchers have used several machine learning (ML) techniques to improve the classification performance with high accuracy and low false-alarm rate. However, the emphasis on real-world deployment of HIDS and AMDS for intrusion and malware detection is limited. To address this issue, we propose a system call traces processing framework with the ability to perform early detection of intrusions and malware. In the proposed framework, a limited number of system calls are analyzed which are invoked by the processes/applications during their early execution. To verify the efficiency, we perform the experiments on a publicly available intrusion dataset known as ADFA-LD dataset and a self-constructed dataset for Android environment. We analyze both the datasets with statistical methods, and process the selected traces with 2-4 gram model and Term Frequency–Inverse Document Frequency (TF-IDF) model during the extraction of features. We train six ML classifiers using the datasets including Decision Tree, Random Forest, Multi-layer Perceptron, K-nearest-neighbor, Multi-variable Naive Bayesian, and Support Vector Machine. The experimental results demonstrate that the performance of proposed HIDS and AMDS are similar to the approaches that used all the system calls invoked during the full execution of applications. We also develop a client-server architecture based Android app for our Android malware detection system.</p>
60

Detecting Information Leakage in Android Malware Using Static Taint Analysis

Kelkar, Soham P. January 2017 (has links)
No description available.

Page generated in 0.0352 seconds