SlideShare a Scribd company logo
1 of 2
Download to read offline
Project Code ANDROID IEEE PAPERS
AND18NXT01 Real-Time Behavior Analysis and Identification for Android Application
AND18NXT02 Re Test Droid: Towards
AND18NXT03 An Android Application for Geo location Based Health Monitoring, Consultancy and
Alarm System
AND18NXT04 Hybrid Encryption for Securing Shared Preferences of Android Applications
AND18NXT05 Android application behavioral analysis through intent monitoring
AND18NXT06 Master Route: Android application for finding the optimal traffic route
AND18NXT07 User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login
on Android Apps and Mitigating Strategies
AND18NXT08 D Defender: Android application threat detection using static and dynamic analysis
AND18NXT09 What Do Software Developers Need to Know to Build Secure Energy
Android Applications
AND18NXT10 Towards Model Checking Android Applications
AND18NXT11 Frag Droid: Automated User Interface Interaction with Activity and Fragment
Analysis in Android Applications
AND18NXT12 Bridge Taint: A Bi-directional Dynamic Taint Tracking Method for JavaScript B
in Android Hybrid Applications
AND18NXT13 Anti-theft cloud application for android operating system (Nougats)
AND18NXT14 Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect
Similarity at Source Code Level
AND18NXT15 High-Frequency Keywords to Predict Defects for Android Applications
AND18NXT16 NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling
Android Applications
AND18NXT17 Detection of repackaged Android applications based on Apps Permi
AND18NXT18 Digital Forensic Analysis of Instant Messaging Applications on Android Smart
phones
AND18NXT19 Understanding JavaScript Vulnerabilities in Large Real
ANDROID IEEE PAPERS – 2018 PROJECT TITLES WITH ABSTRACT
Time Behavior Analysis and Identification for Android Application
Re Test Droid: Towards Safer Regression Test Selection for Android Application
An Android Application for Geo location Based Health Monitoring, Consultancy and
Hybrid Encryption for Securing Shared Preferences of Android Applications
Android application behavioral analysis through intent monitoring
Master Route: Android application for finding the optimal traffic route
User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login
on Android Apps and Mitigating Strategies
D Defender: Android application threat detection using static and dynamic analysis
What Do Software Developers Need to Know to Build Secure Energy-
Android Applications
Towards Model Checking Android Applications
Frag Droid: Automated User Interface Interaction with Activity and Fragment
Analysis in Android Applications
directional Dynamic Taint Tracking Method for JavaScript B
in Android Hybrid Applications
theft cloud application for android operating system (Nougats)
Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect
Similarity at Source Code Level
Frequency Keywords to Predict Defects for Android Applications
NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling
Android Applications
Detection of repackaged Android applications based on Apps Permissions
Digital Forensic Analysis of Instant Messaging Applications on Android Smart
Understanding JavaScript Vulnerabilities in Large Real-World Android Applications
Time Behavior Analysis and Identification for Android Application
Safer Regression Test Selection for Android Application
An Android Application for Geo location Based Health Monitoring, Consultancy and
Hybrid Encryption for Securing Shared Preferences of Android Applications
Master Route: Android application for finding the optimal traffic route
User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login
D Defender: Android application threat detection using static and dynamic analysis
-Efficient
Frag Droid: Automated User Interface Interaction with Activity and Fragment
directional Dynamic Taint Tracking Method for JavaScript Bridges
Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect
Frequency Keywords to Predict Defects for Android Applications
NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling
ssions
Digital Forensic Analysis of Instant Messaging Applications on Android Smart
World Android Applications
AND18NXT20 QBE: Q Learning-Based Exploration of Android
AND18NXT21 Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String
and Structural Static Features
AND18NXT22 Forensic analysis of encrypted instant messaging applications on Android
AND18NXT23 A review of cloned
AND18NXT24 Bypassing DRM protection in e
AND18NXT25 Detecting third-party libraries in Android applications with high precision and recall
Based Exploration of Android Applications
Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String
and Structural Static Features
Forensic analysis of encrypted instant messaging applications on Android
A review of cloned mobile malware applications for android devices
Bypassing DRM protection in e-book applications on Android
party libraries in Android applications with high precision and recall
Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String
Forensic analysis of encrypted instant messaging applications on Android
party libraries in Android applications with high precision and recall

More Related Content

Similar to ANDROID IEEE PAPERS – 2018 PROJECT TITLES

2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects listtmksmanju1
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Zahid Qaisar
 
Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroidKruti Sharma
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesCSCJournals
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISijitcs
 

Similar to ANDROID IEEE PAPERS – 2018 PROJECT TITLES (20)

2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list2018 and 2019 android ieee projects list
2018 and 2019 android ieee projects list
 
Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)Android malware detection_using_autoenco (1)
Android malware detection_using_autoenco (1)
 
Droid echo
Droid echoDroid echo
Droid echo
 
Final_Presentation_FlowDroid
Final_Presentation_FlowDroidFinal_Presentation_FlowDroid
Final_Presentation_FlowDroid
 
A Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection TechniquesA Systematic Review of Android Malware Detection Techniques
A Systematic Review of Android Malware Detection Techniques
 
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSISANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
ANDROID UNTRUSTED DETECTION WITH PERMISSION BASED SCORING ANALYSIS
 

More from Nxtlogic Software Solutions

Nxtlogic Software Solutions - Website and Web Application Development
Nxtlogic Software Solutions - Website and Web Application DevelopmentNxtlogic Software Solutions - Website and Web Application Development
Nxtlogic Software Solutions - Website and Web Application DevelopmentNxtlogic Software Solutions
 

More from Nxtlogic Software Solutions (18)

Mechanical main project Nxtlogic
Mechanical main project NxtlogicMechanical main project Nxtlogic
Mechanical main project Nxtlogic
 
Managment project titles 2018
Managment project titles 2018 Managment project titles 2018
Managment project titles 2018
 
Jsp project titles
Jsp project titlesJsp project titles
Jsp project titles
 
Java project titles
Java project titlesJava project titles
Java project titles
 
Embedded mini project_titles
Embedded mini project_titlesEmbedded mini project_titles
Embedded mini project_titles
 
Embedded main project_titles - Nxtlogic
Embedded main project_titles - NxtlogicEmbedded main project_titles - Nxtlogic
Embedded main project_titles - Nxtlogic
 
Embedded main project itles - Nxtlogic
Embedded main project itles - NxtlogicEmbedded main project itles - Nxtlogic
Embedded main project itles - Nxtlogic
 
Matlab IEEE 2018 Project Titles
Matlab IEEE 2018 Project TitlesMatlab IEEE 2018 Project Titles
Matlab IEEE 2018 Project Titles
 
VLSI IEEE 2018 Project Titles
VLSI IEEE 2018 Project TitlesVLSI IEEE 2018 Project Titles
VLSI IEEE 2018 Project Titles
 
Power system ieee 2018 projects titles
Power system ieee   2018 projects titlesPower system ieee   2018 projects titles
Power system ieee 2018 projects titles
 
Ns2 iieee papers 2018 project titles
Ns2 iieee papers 2018 project titlesNs2 iieee papers 2018 project titles
Ns2 iieee papers 2018 project titles
 
Computer science 2018(titles)
Computer science 2018(titles)Computer science 2018(titles)
Computer science 2018(titles)
 
Vb.Net Project Titles with Abstracts
Vb.Net Project Titles with AbstractsVb.Net Project Titles with Abstracts
Vb.Net Project Titles with Abstracts
 
VLSI based final year project topics and ideas
VLSI based final year project topics and ideas VLSI based final year project topics and ideas
VLSI based final year project topics and ideas
 
Nxtlogic Software Solutions - Website and Web Application Development
Nxtlogic Software Solutions - Website and Web Application DevelopmentNxtlogic Software Solutions - Website and Web Application Development
Nxtlogic Software Solutions - Website and Web Application Development
 
Vb.net project titles 2014 15
Vb.net project titles 2014 15Vb.net project titles 2014 15
Vb.net project titles 2014 15
 
Vlsi ieee 2014 project titles
Vlsi ieee 2014 project titlesVlsi ieee 2014 project titles
Vlsi ieee 2014 project titles
 
Android Project Titles 2014 15
Android Project Titles 2014 15Android Project Titles 2014 15
Android Project Titles 2014 15
 

Recently uploaded

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 

ANDROID IEEE PAPERS – 2018 PROJECT TITLES

  • 1. Project Code ANDROID IEEE PAPERS AND18NXT01 Real-Time Behavior Analysis and Identification for Android Application AND18NXT02 Re Test Droid: Towards AND18NXT03 An Android Application for Geo location Based Health Monitoring, Consultancy and Alarm System AND18NXT04 Hybrid Encryption for Securing Shared Preferences of Android Applications AND18NXT05 Android application behavioral analysis through intent monitoring AND18NXT06 Master Route: Android application for finding the optimal traffic route AND18NXT07 User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies AND18NXT08 D Defender: Android application threat detection using static and dynamic analysis AND18NXT09 What Do Software Developers Need to Know to Build Secure Energy Android Applications AND18NXT10 Towards Model Checking Android Applications AND18NXT11 Frag Droid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications AND18NXT12 Bridge Taint: A Bi-directional Dynamic Taint Tracking Method for JavaScript B in Android Hybrid Applications AND18NXT13 Anti-theft cloud application for android operating system (Nougats) AND18NXT14 Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level AND18NXT15 High-Frequency Keywords to Predict Defects for Android Applications AND18NXT16 NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling Android Applications AND18NXT17 Detection of repackaged Android applications based on Apps Permi AND18NXT18 Digital Forensic Analysis of Instant Messaging Applications on Android Smart phones AND18NXT19 Understanding JavaScript Vulnerabilities in Large Real ANDROID IEEE PAPERS – 2018 PROJECT TITLES WITH ABSTRACT Time Behavior Analysis and Identification for Android Application Re Test Droid: Towards Safer Regression Test Selection for Android Application An Android Application for Geo location Based Health Monitoring, Consultancy and Hybrid Encryption for Securing Shared Preferences of Android Applications Android application behavioral analysis through intent monitoring Master Route: Android application for finding the optimal traffic route User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login on Android Apps and Mitigating Strategies D Defender: Android application threat detection using static and dynamic analysis What Do Software Developers Need to Know to Build Secure Energy- Android Applications Towards Model Checking Android Applications Frag Droid: Automated User Interface Interaction with Activity and Fragment Analysis in Android Applications directional Dynamic Taint Tracking Method for JavaScript B in Android Hybrid Applications theft cloud application for android operating system (Nougats) Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level Frequency Keywords to Predict Defects for Android Applications NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling Android Applications Detection of repackaged Android applications based on Apps Permissions Digital Forensic Analysis of Instant Messaging Applications on Android Smart Understanding JavaScript Vulnerabilities in Large Real-World Android Applications Time Behavior Analysis and Identification for Android Application Safer Regression Test Selection for Android Application An Android Application for Geo location Based Health Monitoring, Consultancy and Hybrid Encryption for Securing Shared Preferences of Android Applications Master Route: Android application for finding the optimal traffic route User Credential Cloning Attacks in Android Applications: Exploiting Automatic Login D Defender: Android application threat detection using static and dynamic analysis -Efficient Frag Droid: Automated User Interface Interaction with Activity and Fragment directional Dynamic Taint Tracking Method for JavaScript Bridges Droid CC: A Scalable Clone Detection Approach for Android Applications to Detect Frequency Keywords to Predict Defects for Android Applications NFS: An Algorithm for Avoiding Restarts to Improve the Efficiency of Crawling ssions Digital Forensic Analysis of Instant Messaging Applications on Android Smart World Android Applications
  • 2. AND18NXT20 QBE: Q Learning-Based Exploration of Android AND18NXT21 Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features AND18NXT22 Forensic analysis of encrypted instant messaging applications on Android AND18NXT23 A review of cloned AND18NXT24 Bypassing DRM protection in e AND18NXT25 Detecting third-party libraries in Android applications with high precision and recall Based Exploration of Android Applications Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features Forensic analysis of encrypted instant messaging applications on Android A review of cloned mobile malware applications for android devices Bypassing DRM protection in e-book applications on Android party libraries in Android applications with high precision and recall Droid Ensemble: Detecting Android Malicious Applications With Ensemble of String Forensic analysis of encrypted instant messaging applications on Android party libraries in Android applications with high precision and recall