Digital Library
Search: "[ keyword: Android ]" (24)
-
ChoonSung Nam, DongRyeol Shin, Vol. 18, No. 2, pp. 1-12, Apr. 2017
10.7472/jksii.2017.18.2.01
Keywords: Autonomous access, Access point, Public wireless LAN, SSID, iBeacon, Android -
Jong-jin Park, Min-kyong Choi, Jong-chang Ahn, Vol. 18, No. 1, pp. 105-120, Feb. 2017
10.7472/jksii.2017.18.1.105
Keywords: Smartphones, information security, Degree of personal risk accepting, Buying intention, Android, iOS -
Dong-ryul Kim, Jong-sub Moon, Vol. 17, No. 6, pp. 93-102, Dec. 2016
10.7472/jksii.2016.17.6.93
Keywords: Android memory protection, ptrace system call, /proc/PID/mem virtual file, Virtual memory protection, memory editor -
14. A Study of Security Checks for Android Least Privilege - focusing on mobile financial services -Byung-chul Cho, Jin-young Choi, Vol. 17, No. 1, pp. 91-100, Feb. 2016
10.7472/jksii.2016.17.1.91
Keywords: Mobile Security, android security, permissions, least privilege -
15. Development of Android App for Suppor ting Smooth Multimedia Streaming Service Using Frame BufferSang-min Seo, Jonnho Kwon, Yoon-Ho Choi, Vol. 17, No. 1, pp. 55-64, Feb. 2016
10.7472/jksii.2016.17.1.55
Keywords: Mobile Device, android app, jni, frame buffer, stream service -
Young-Hwan Choi, Hongrae Kim, Min Hong, Vol. 16, No. 2, pp. 49-56, Apr. 2015
10.7472/jksii.2015.16.2.49
Keywords: image processing, lane detection, android NDK, Smartphone, Road luminance measurement, GPS sensor -
Dueckyoun Cho, Jaeyoung Choi, Eunhoe Kim, Gi-Du Gang, Vol. 16, No. 2, pp. 67-76, Apr. 2015
10.7472/jksii.2015.16.2.67
Keywords: illegally-copied app, detector, android platform, execution hiding, odex file -
ChoonSung Nam, HyunHee Jung, DongRyeol Shin, Vol. 15, No. 6, pp. 27-34, Dec. 2014
10.7472/jksii.2014.15.6.27
Keywords: Smart Device, Loss Prevention, iBeacon, Android -
You Joung Ham, Hyung-Woo Lee, Vol. 15, No. 3, pp. 31-44, Jun. 2014
10.7472/jksii.2014.15.3.31
Keywords: Android, Real-time System Call, Event Similarity, Malicious Trojan Horse Application, Discrimination Mechanism -
You Joung Ham, Hyung-Woo Lee, Vol. 14, No. 6, pp. 125-0, Dec. 2013
10.7472/jksii.2013.14.6.125
Keywords: Android, Normal and Malicious Application, System call events, pattern analysis, Similarity Analysis