Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,350,568 papers from all fields of science
Search
Sign In
Create Free Account
Android
Known as:
Android system
, Android 3.0 Honeycomb
, Android mobile phone
Expand
Android is a mobile operating system developed by Google, based on the Linux kernel and designed primarily for touchscreen mobile devices such as…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
ASUS MeMO Pad HD 7
Agent.BTZ
Android Gingerbread
BOINC
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Novel Security Framework for Managing Android Permissions Using Blockchain Technology
Abdellah Ouaguid
,
N. Abghour
,
M. Ouzzif
International Journal of Cloud Applications and…
2018
Corpus ID: 46824372
This article presents a new framework named ANDROSCANREG (Android Permissions Scan Registry) thatallows toextract…
Expand
Review
2018
Review
2018
Android Malware Detection: A Survey
M. Odusami
,
O. Abayomi-Alli
,
S. Misra
,
Olamilekan Shobayo
,
Robertas Damaševičius
,
R. Maskeliūnas
International Conference on Applied Informatics
2018
Corpus ID: 70176085
In the world today, smartphones are evolving every day and with this evolution, security becomes a big issue. Security is an…
Expand
2016
2016
Optimizing Reactive Routing Over Virtual Nodes in VANETs
J. Bravo-Torres
,
Martín López Nores
,
Y. Blanco-Fernández
,
J. Pazos-Arias
,
M. Cabrer
,
A. Gil-Solla
IEEE Transactions on Vehicular Technology
2016
Corpus ID: 7627027
The virtual node layer (VNLayer) is a cluster-based approach to handle communications in mobile ad hoc networks (MANETs…
Expand
2016
2016
Video Streaming Over Vehicular Ad Hoc Networks Using Erasure Coding
A. Mammeri
,
A. Boukerche
,
Zhifei Fang
IEEE Systems Journal
2016
Corpus ID: 27346268
Video streaming over vehicular ad hoc networks (VANETs) is an attractive application that provides many useful services for…
Expand
Review
2015
Review
2015
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues
Ahmad Karim
,
Syed Adeel Ali Shah
,
R. Salleh
,
Muhammad Arif
,
R. M. Noor
,
Shahaboddin Shamshirband
KSII Transactions on Internet and Information…
2015
Corpus ID: 18366581
The rapid development of smartphone technologies have resulted in the evolution of mobile botnets. The implications of botnets…
Expand
2012
2012
TreeDroid: a tree automaton based approach to enforcing data processing policies
M. Dam
,
Gurvan Le Guernic
,
Andreas Lundblad
Conference on Computer and Communications…
2012
Corpus ID: 3398551
Current approaches to security policy monitoring are based on linear control flow constraints such as 'runQuery' may be evaluated…
Expand
Highly Cited
2011
Highly Cited
2011
Network environ theory, simulation, and EcoNet® 2.0
J. Schramski
,
C. Kazanci
,
E. Tollner
Environmental Modelling & Software
2011
Corpus ID: 13242107
Highly Cited
2011
Highly Cited
2011
Context-driven personalized service discovery in pervasive environments
K. Rasch
,
Fei Li
,
Sanjin Sehic
,
R. Ayani
,
S. Dustdar
World wide web (Bussum)
2011
Corpus ID: 1356533
Pervasive environments are characterized by a large number of embedded devices offering their services to the user. Which of the…
Expand
2010
2010
Challenges for mobile application development
Allan Hammershøj
,
Antonio Sapuppo
,
R. Tadayoni
International Conference on Intelligence in Next…
2010
Corpus ID: 16900920
Mobile communication has been dominated by vertically integrated service provision in an ‘operator centric model’, which has been…
Expand
2008
2008
Characterization of the Dynamical Processes in All-Optical Signal Processing Using Semiconductor Optical Amplifiers
I. Kang
,
C. Dorrer
,
+16 authors
J. Jaques
IEEE Journal of Selected Topics in Quantum…
2008
Corpus ID: 43193707
We present experimental investigations of the dynamical properties of semiconductor optical amplifiers (SOAs) and their impacts…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE