Sökning: "Android Emulator"
Visar resultat 1 - 5 av 10 uppsatser innehållade orden Android Emulator.
1. Advanced Hardened Registration Process for Mobile Crowd Sensing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Mobile Crowd Sensing (MCS) or Participatory Sensing (PS) are two emerging systems as smart mobile devices become ubiquitous. One of the advantages of such a sensing system is that almost anyone with a mobile device can become a moving "sensor". LÄS MER
2. Empirisk undersökning av minnesredigering på Android-spel
Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Minnesredigering är en av de vanligaste metoderna för att modifiera det lokala minnet. Den används bland annat som hackningsmetod för spel på olika plattformar. Idag existerar det en uppsjö av Androidapplikationer som har minnesredigeringsfunktion. LÄS MER
3. Development of a Multi Sensor Android Application
Master-uppsats, Blekinge Tekniska Högskola/Institutionen för matematik och naturvetenskapSammanfattning : There has been an enormous growth in the usage of smartphones in recent times. Smartphones are not limited to communication purposes. It has various applications designed as per the daily requirements of humans such as web-searching, online shopping, bank transactions, games, etc. LÄS MER
4. Studying the effectiveness of dynamic analysis for fingerprinting Android malware behavior
Master-uppsats, Linköpings universitet/Databas och informationsteknikSammanfattning : Android is the second most targeted operating system for malware authors and to counter the development of Android malware, more knowledge about their behavior is needed. There are mainly two approaches to analyze Android malware, namely static and dynamic analysis. LÄS MER
5. Hardened Registration Process for Participatory Sensing
Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)Sammanfattning : Participatory sensing systems need to gather information from a largenumber of participants. However, the openness of the system is a doubleedgedsword: by allowing practically any user to join, the system can beabused by an attacker who introduces a large number of virtual devices. LÄS MER