Browsing by Subject Android (Electronic resource)
Showing results 1 to 16 of 16
Issue Date | Title | Author(s) |
2017 | AndroNeo : hardening Android malware sandboxes by predicting evasion heuristics | Leguesse, Yonas; Vella, Mark Joseph; Ellul, Joshua |
2014 | CASPER : hybrid context aware POI and event recommender | Tabone, Jean Paul (2014) |
2017 | Educational aspects of current mobile applications | Sakaeva, Liliya R.; Eremeeva, Guzel R.; Baranova, Alfiya R. |
2017 | Enhancing android malware sandboxes with anti-evasion code patching | Leguesse, Yonas |
2017 | Extending Android's binder as a basis for application monitoring | Laferla, Giancarlo |
2023 | The impact of Android UI attacks on malware forensic footprints | Bugeja, Manwel (2023) |
2017 | Leveraging automated test case distribution and execution to mitigate the test scenario explosion problem on android mobile devices | Attard, Sebastian |
2011 | Location-based recommendation system | Bonanno, Miriam (2011) |
2023 | Memory forensics of android backdooring based on App virtualization | Galea, Enrique Anthony (2023) |
2017 | Memory forensics of insecure android inter-app communications | Vella, Mark Joseph; Cilia, Rachel |
2012 | On and off body sensor fusion for a 3d motion controller | Zammit, Joseph (2012) |
2023 | Responding to stealthy attacks on android using timely-captured memory dumps | Bellizzi, Jennifer (2023) |
2016 | Threat analysis of android capability leaks | Cilia, Rachel |
2023 | Using infrastructure-based agents to enhance forensic logging of third-party applications | Bellizzi, Jennifer; Vella, Mark Joseph; Colombo, Christian; Hernandez-Castro, Julio |
2019 | Vjaġġ – a thick-client smart-phone journey detection algorithm | Camilleri, Michael P.J.; Muscat, Adrian; Buttigieg, Victor; Attard, Maria |
2018 | Volatile memory-centric investigation of SMS-hijacked phones : a Pushbullet case study | Vella, Mark Joseph; Rudramurthy, Vishwas |