On SOMA Parallelization with Android Devices
نویسندگان
چکیده
منابع مشابه
Applying Behavioral Detection on Android-Based Devices
We present Andromaly a behavioral-based detection framework for Android-powered mobile devices. The proposed framework realizes a Host-based Intrusion Detection System (HIDS) that continuously monitors various features and events obtained from the mobile device, and then applies Machine Learning methods to classify the collected data as normal (benign) or abnormal (malicious). Since no maliciou...
متن کاملParallelization Algorithm for Android OS using OpenMP
Developments in mobile technology have escalated with unprecedented speeds in the last years in all areas of implementation. One of these areas is multicore computing and parallel programming. Though most modern mobile devices are at least multithreaded and commonly multicore, few applications can benefit such technology. In this paper we show the benefits of multithreaded programming using Ope...
متن کاملBuilding SPARQL-Enabled Applications with Android devices
In this paper, we show how features can be added to an Android device (a smartphone) to enable mobile applications to expose data through a SPARQL endpoint. Using simple query federation mechanisms, we describe a demonstrator illustrating how SPARQL-Enabled Android devices can allow us to rapidly develop applications mashing-up data from a collaborative network of sensor-based data sources.
متن کاملOn Reliability of Android Wearable Health Devices
Wearable devices are increasingly being used for monitoring health signals and for fitness purposes with typical uses being calorie tracker, workout assistant, and step counter. Even though these wearables can measure many health signals (e.g. heart rate), they are still not perceived as highly accurate, relative to clinical monitoring devices. In this paper, we investigate the accuracy of hear...
متن کاملPoster: Design of Backdoor on Android Devices
This paper presents a practical design of backdoor to permanently bypass the screen lock mechanisms (e.g., 4-digit PIN) on Android devices. 1. Our goal and assumptions We aim to give insights in designing backdoor that can be used to provide persistent access to a victim’s Android device by compromising the secret for user authentication while effectively hiding its presence from the victim. We...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Advanced Engineering and Computation
سال: 2019
ISSN: 2588-123X,1859-2244
DOI: 10.25073/jaec.201933.247