SlideShare a Scribd company logo
1 of 2
1. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled
Source Code:
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6894210&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&rowsPerPage=100&searc
hField=Search_All
2. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6945855&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&searchField=Search_All
3. COVERT: Compositional Analysis of Android Inter-App Permission Leakage
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7079508&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=2&searchF
ield=Search_All
4. SmartPhoto: A Resource-Aware Crowdsourcing Approach for Image Sensing with
Smartphones
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7126979&queryText=android
&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=12&search
Field=Search_All
5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7061506&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=2&searchField=Search_All
6. Friendbook: A Semantic-Based Friend Recommendation System for Social Networks
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6811189&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=2&searchField=Search_All
7. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7127000&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=3&searchField=Search_All
8. My Privacy My Decision: Control of Photo Sharing on Online Social Networks
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7120947&queryText=android+
Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber
=5&searchField=Search_All
9. Continuous and Transparent User Identity Verification for Secure Internet
Services
http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6702439&queryText=a
ndroid+Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&
pageNumber=7&searchField=Search_All

More Related Content

Viewers also liked

wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
parry prabhu
 
Vector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysisVector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysis
parry prabhu
 

Viewers also liked (20)

Performance evaluation
Performance evaluationPerformance evaluation
Performance evaluation
 
system requirements for .net projects
system requirements for .net projects system requirements for .net projects
system requirements for .net projects
 
wireless sensor network
wireless sensor networkwireless sensor network
wireless sensor network
 
Big data requirements
Big data requirementsBig data requirements
Big data requirements
 
Vector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysisVector sparse representation of color image using quaternion matrix analysis
Vector sparse representation of color image using quaternion matrix analysis
 
Best hospitals lists
Best hospitals listsBest hospitals lists
Best hospitals lists
 
Cloud computing topics
Cloud computing topicsCloud computing topics
Cloud computing topics
 
S3 (1)
S3 (1)S3 (1)
S3 (1)
 
wireless sensor network 2015-2016
wireless sensor network 2015-2016wireless sensor network 2015-2016
wireless sensor network 2015-2016
 
Optical fiber networks
Optical fiber networksOptical fiber networks
Optical fiber networks
 
Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015Congestion control, routing, and scheduling 2015
Congestion control, routing, and scheduling 2015
 
wireless sensor network,mobile networking
wireless sensor network,mobile networkingwireless sensor network,mobile networking
wireless sensor network,mobile networking
 
Database
DatabaseDatabase
Database
 
White breads vs brown breads
White breads vs brown breadsWhite breads vs brown breads
White breads vs brown breads
 
Tecxpera technologies
Tecxpera technologiesTecxpera technologies
Tecxpera technologies
 
Install notes
Install notesInstall notes
Install notes
 
Aston martin
Aston martinAston martin
Aston martin
 
real time big data
real time big data real time big data
real time big data
 
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...Hasbe a hierarchical attribute based solution for flexible and scalable acces...
Hasbe a hierarchical attribute based solution for flexible and scalable acces...
 
system requirement for network simulator projects
 system requirement for network simulator projects system requirement for network simulator projects
system requirement for network simulator projects
 

Similar to 2015 ieee Android titles link

Day 1 Android Apps (Education ICT-Comp Science)
Day 1 Android Apps (Education ICT-Comp Science)Day 1 Android Apps (Education ICT-Comp Science)
Day 1 Android Apps (Education ICT-Comp Science)
morewebber
 
Usha_cv_1yr
Usha_cv_1yrUsha_cv_1yr
Usha_cv_1yr
Usha NS
 
Pankaj Resume Manual Testing
Pankaj Resume Manual TestingPankaj Resume Manual Testing
Pankaj Resume Manual Testing
pankaj tiwari
 

Similar to 2015 ieee Android titles link (20)

Exposed! A case study on the vulnerability-proneness of Google Play Apps
Exposed! A case study on the vulnerability-proneness of Google Play AppsExposed! A case study on the vulnerability-proneness of Google Play Apps
Exposed! A case study on the vulnerability-proneness of Google Play Apps
 
IRJET- Android Malware Detection System
IRJET-  	  Android Malware Detection SystemIRJET-  	  Android Malware Detection System
IRJET- Android Malware Detection System
 
Shashank
ShashankShashank
Shashank
 
Deep linking slides
Deep linking slidesDeep linking slides
Deep linking slides
 
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
APIsecure 2023 - Android Applications and API Hacking, Gabrielle BotbolAPIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
APIsecure 2023 - Android Applications and API Hacking, Gabrielle Botbol
 
Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store         Survey on Fraud Malware Detection in Google Play Store
Survey on Fraud Malware Detection in Google Play Store
 
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...IRJET-  	  A Review on Several Vulnerabilities Detection Techniques in Androi...
IRJET- A Review on Several Vulnerabilities Detection Techniques in Androi...
 
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptxA Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
A Step-by-Step Guide on How to Scrape Data from Mobile Apps.pptx
 
"How Can Web Devs Reach the Mobile Market?" by Dimitris Michalakos, Web Techn...
"How Can Web Devs Reach the Mobile Market?" by Dimitris Michalakos, Web Techn..."How Can Web Devs Reach the Mobile Market?" by Dimitris Michalakos, Web Techn...
"How Can Web Devs Reach the Mobile Market?" by Dimitris Michalakos, Web Techn...
 
Day 1 Android Apps (Education ICT-Comp Science)
Day 1 Android Apps (Education ICT-Comp Science)Day 1 Android Apps (Education ICT-Comp Science)
Day 1 Android Apps (Education ICT-Comp Science)
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
 
Varuns resume
Varuns resumeVaruns resume
Varuns resume
 
SmartVision Android App
SmartVision Android AppSmartVision Android App
SmartVision Android App
 
3 yrs_ testing
3 yrs_ testing3 yrs_ testing
3 yrs_ testing
 
apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...
apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...
apidays New York 2023 - Android Applications and APIs Hacking, Gabrielle Botb...
 
Android pentesting
Android pentestingAndroid pentesting
Android pentesting
 
Usha_cv_1yr
Usha_cv_1yrUsha_cv_1yr
Usha_cv_1yr
 
Pankaj Resume Manual Testing
Pankaj Resume Manual TestingPankaj Resume Manual Testing
Pankaj Resume Manual Testing
 
Appium Interview Questions and Answers | Edureka
Appium Interview Questions and Answers | EdurekaAppium Interview Questions and Answers | Edureka
Appium Interview Questions and Answers | Edureka
 
iOS & Android App Indexing & App Actions
iOS & Android App Indexing & App ActionsiOS & Android App Indexing & App Actions
iOS & Android App Indexing & App Actions
 

More from parry prabhu (6)

The american academy of neurology
The american academy of neurologyThe american academy of neurology
The american academy of neurology
 
K mean-clustering algorithm
K mean-clustering algorithmK mean-clustering algorithm
K mean-clustering algorithm
 
Privacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storagePrivacy preserving public auditing for regenerating-code-based cloud storage
Privacy preserving public auditing for regenerating-code-based cloud storage
 
how to make a 1st review presentation
how to make a 1st review presentationhow to make a 1st review presentation
how to make a 1st review presentation
 
system requirements for java project
system requirements for java projectsystem requirements for java project
system requirements for java project
 
system requirements for android projects
system requirements for android projectssystem requirements for android projects
system requirements for android projects
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
AldoGarca30
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
ssuser89054b
 

Recently uploaded (20)

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using PipesLinux Systems Programming: Inter Process Communication (IPC) using Pipes
Linux Systems Programming: Inter Process Communication (IPC) using Pipes
 
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
Unit 4_Part 1 CSE2001 Exception Handling and Function Template and Class Temp...
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
1_Introduction + EAM Vocabulary + how to navigate in EAM.pdf
 
Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257Memory Interfacing of 8086 with DMA 8257
Memory Interfacing of 8086 with DMA 8257
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)Introduction to Artificial Intelligence ( AI)
Introduction to Artificial Intelligence ( AI)
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 

2015 ieee Android titles link

  • 1. 1. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code: http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6894210&queryText=android &refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&rowsPerPage=100&searc hField=Search_All 2. The Impact of API Change- and Fault-Proneness on the User Ratings of Android Apps http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6945855&queryText=android &refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&searchField=Search_All 3. COVERT: Compositional Analysis of Android Inter-App Permission Leakage http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7079508&queryText=android &refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=2&searchF ield=Search_All 4. SmartPhoto: A Resource-Aware Crowdsourcing Approach for Image Sensing with Smartphones http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7126979&queryText=android &refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber=12&search Field=Search_All 5. SBVLC: Secure Barcode-based Visible Light Communication for Smartphones http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7061506&queryText=android+ Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber =2&searchField=Search_All 6. Friendbook: A Semantic-Based Friend Recommendation System for Social Networks http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6811189&queryText=android+ Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber =2&searchField=Search_All 7. Alterdroid: Differential Fault Analysis of Obfuscated Smartphone Malware http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7127000&queryText=android+ Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber =3&searchField=Search_All
  • 2. 8. My Privacy My Decision: Control of Photo Sharing on Online Social Networks http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=7120947&queryText=android+ Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year&pageNumber =5&searchField=Search_All 9. Continuous and Transparent User Identity Verification for Secure Internet Services http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6702439&queryText=a ndroid+Computing&refinements%5B%5D=&ranges%5B%5D=2015_2015_Year& pageNumber=7&searchField=Search_All