Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Android-Api'
Android-Api published presentations and documents on DocSlides.
DroidChameleon
by myesha-ticknor
: Evaluating Android Anti-malware against Transfo...
Java
by jane-oiler
application. s. . reverse. . engineering. Anton...
RemEm
by tatyana-admore
Lifelogging. . sousveillance. For Protesters &am...
Dissecting Android Malware : Characterization and Evolution
by liane-varnes
Author : . Yajin. Zhou, . Xuxuan. Jiang. TJ. In...
Android Graphics Library
by celsa-spraggs
Color. Android . colors are represented with four...
LabAdmin
by tawny-fly
. EXP. Module . Android Application. By:. . Was...
Coursework 2: getting started (1) – running the phone emu
by jane-oiler
Chris Greenhalgh. G54UBI / 2011-02-21. 1. Chris G...
Obfuscation
by phoebe-click
and Hardenin. g . tool . for . Android Apps. Inst...
Mobile web
by faustina-dinatale
Development and Debugging. Ran Ben Aharon. Front ...
Dragonfly:
by luanne-stotts
Encapsulating Android for Instrumentation. Univer...
Building and Deploying Safe and Secure Android Apps for Ent
by lois-ondreau
Presented . by. Technology Consulting . Group. at...
An Analysis of Android SSL (
by giovanna-bartolotta
In)Security. Why Eve & Mallory Love Android. ...
Mobile Based
by karlyn-bohler
Android Application for Health Facility . Latitud...
Android Security Through ARM TrustZone Emulation
by celsa-spraggs
Senior Design May 12-08. Abstract. Design. Alex ....
Store Item Finder
by calandra-battersby
for Android. Brian McClure. Aarron Hulswitt. Kevr...
Activity
by briana-ranney
Activity. Activity. Activity. Applications were o...
Peeking into Your App
by luanne-stotts
. without Actually Seeing It. : . UI State Infer...
Tworzenie aplikacji mobilnych
by marina-yarberry
Android. Widgety. Widget. = kontrolka. Dziedzicz...
Intent
by calandra-battersby
A. n . Intent describes the operation to be perfo...
RetroSkeleton
by myesha-ticknor
:. Retrofitting Android Apps. Benjamin Davis. , ...
Set up Computer
by briana-ranney
** Please be aware screenshots. May not . match ...
Android Development -
by lois-ondreau
2. Prabhaker. . Mateti. CEG436: Mobile Computing...
Of Bytes,
by giovanna-bartolotta
Cycles. . and. . Battery. Life. Who am I?. @. ...
PrivacyShield
by myesha-ticknor
: Real-time Monitoring and Detection of Android P...
Enhancement & Roadmap to
by phoebe-click
Aakash. platform . objective. Improve . Aakash. ...
A Methodology for Empirical Analysis of
by lindy-dunigan
Permission. -Based Security Models and its Applic...
Understanding
by jane-oiler
Android Security. Presented By . Abhishek. Singh...
Yongjian
by tatiana-dople
. Hu . Tanzirul. . Azim. Iulian . Neamtiu. ...
Which Smart Phone?
by sherrill-nordquist
A Comparison. (slightly biased). Original Author:...
Motivation
by faustina-dinatale
Medium Range Security for Protecting Assets. Off ...
3-714
by lindy-dunigan
Building Cross-Platform Mobile Apps in C++ with V...
The Merging Point of
by myesha-ticknor
Android and Swing. David Qiao. JIDE Software, Inc...
Screenmilker
by myesha-ticknor
: How to Milk Your Android Screen . for Secrets. ...
DroidChameleon
by ellena-manuel
: Evaluating Android Anti-malware against Transfo...
Versatile yet Lightweight Record-and-Replay for Android
by min-jolicoeur
Yongjian. . Hu . Tanzirul. . Azim. ...
Evelyn Rodriguez
by pasty-toler
Swot. Analysis of Smart Phones . Abstract. My pr...
Adapters
by lois-ondreau
1. CS440. Adapters (again!). Adapters . are . bri...
New Technology
by giovanna-bartolotta
Android. Security. Mobile Threat Report Q4 . 2012...
Rooting
by myesha-ticknor
By Rajan. T. opics. What is rooting?. Different w...
Getting Started with Android Programming Note: if
by alexa-scheidler
Getting Started with Android Programming Note: if ...
Load More...