Dissertations / Theses on the topic 'Android App Security Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 48 dissertations / theses for your research on the topic 'Android App Security Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wei, Fengguo. "Precise, General, and Efficient Data-flow Analysis for Security Vetting of Android Apps." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7377.
Full textKulkarni, Keyur. "Android Malware Detection through Permission and App Component Analysis using Machine Learning Algorithms." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525454213460236.
Full textAmini, Shahriyar. "Analyzing Mobile App Privacy Using Computation and Crowdsourcing." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/327.
Full textPoudel, Prabesh. "Security Vetting Of Android Applications Using Graph Based Deep Learning Approaches." Bowling Green State University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1617199500076786.
Full textNguyen, Duc Cuong [Verfasser]. "Improving Android app security and privacy with developers / Duc Cuong Nguyen." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1241117314/34.
Full textMOHAMMAD, TAFIQUR RAHMAN. "Android App Store (Google Play) Mining and Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-127670.
Full textLu, Can. "Revisiting the Evolution of Android Permissions." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535377084768501.
Full textBarton, Daniel John Trevino. "Usable Post-Classification Visualizations for Android Collusion Detection and Inspection." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/72286.
Full textRimando, Ryan A. "Development and analysis of security policies in security enhanced Android." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27896.
Full textFeleke, Nebiyu A. "Security analysis of finance and healthcare android applications." Thesis, Boston University, 2013. https://hdl.handle.net/2144/12099.
Full textChaulagain, Dewan. "Hybrid Analysis of Android Applications for Security Vetting." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1555608766287613.
Full textElish, Karim Omar Mahmoud. "User-Intention Based Program Analysis for Android Security." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/54943.
Full textDell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.
Full textThakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.
Full textHanyáš, Martin. "Analýza bezpečnostních vlastností v OS Android." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-236128.
Full textAli-Gombe, Aisha Ibrahim. "Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications." ScholarWorks@UNO, 2017. http://scholarworks.uno.edu/td/2290.
Full textBjurling, Patrik. "Design and Implementation of a Secure In-app Credit Card Payment System." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-112745.
Full textHedlund, Filip, and Emma Loots. "Information Security Risk Assessment : An Analysis of a Medical Aid Service." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284151.
Full textDerr, Erik [Verfasser], and Michael [Akademischer Betreuer] Backes. "Understanding and assessing security on Android via static code analysis / Erik Derr ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2018. http://d-nb.info/116777079X/34.
Full textDerr, Erik Verfasser], and Michael [Akademischer Betreuer] [Backes. "Understanding and assessing security on Android via static code analysis / Erik Derr ; Betreuer: Michael Backes." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2018. http://nbn-resolving.de/urn:nbn:de:bsz:291-scidok-ds-273450.
Full textSengelmann, Michael. "An Overview of Reverse Engineering and A Security Analysis of TikTok." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1613748245334672.
Full textBorek, Martin. "Intrusion Detection System for Android : Linux Kernel System Salls Analysis." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-222382.
Full textDahlberg, Daniel, Tim Irmel, and Jacob Forsström. "Android-användaren och appbehörigheter : Attityder och beteenden kopplat till säkerhet på mobilen." Thesis, Umeå universitet, Institutionen för informatik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-148004.
Full textSILVA, FILHO Paulo de Barros e. "Static analysis of implicit control flow: resolving Java reflection and Android intents." Universidade Federal de Pernambuco, 2016. https://repositorio.ufpe.br/handle/123456789/17637.
Full textTitze, Dennis Oliver [Verfasser], Claudia [Akademischer Betreuer] Eckert, Claudia [Gutachter] Eckert, and Uwe [Gutachter] Baumgarten. "Analysis and Mitigation of Security Issues on Android / Dennis Oliver Titze ; Gutachter: Claudia Eckert, Uwe Baumgarten ; Betreuer: Claudia Eckert." München : Universitätsbibliothek der TU München, 2019. http://d-nb.info/1184476950/34.
Full textYu, Xiaodong. "Algorithms and Frameworks for Accelerating Security Applications on HPC Platforms." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/93510.
Full textAndriatsimandefitra, Ratsisahanana Radoniaina. "Caractérisation et détection de malware Android basées sur les flux d'information." Thesis, Supélec, 2014. http://www.theses.fr/2014SUPL0025/document.
Full textFrini, Marouane. "Diagnostic des engrenages à base des indicateurs géométriques des signaux électriques triphasés." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSES052.
Full textWANG, ZHENG-ZHE, and 王正喆. "A Study on Security Analysis of Android Application-a Case of Instant Message App." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/2awru8.
Full textHsu, Yu-ling, and 徐語苓. "Malicious Android App Detection Based on Dynamic Analysis of App Characteristics." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/21896259893330201698.
Full textGANG, LIN JR, and 林志剛. "Android Application Security and Permissions Analysis." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/49431475796701707163.
Full textYANG, CHIA-PEI, and 楊家沛. "Security Risks of Communication APP Services and Near Field Communication in Mobile Android Systems." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8b4zhw.
Full textLin, Yu-Cheng, and 林禹成. "A Security Vulnerability Analysis System for Android Application." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/42unf5.
Full textLIN, CHING-CHANG, and 林慶展. "The Wireless Remote Monitoring Home Security and Appliance System in Combination of Android App and Arduino." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/94j534.
Full textPeng, Jou-Hsuan, and 彭柔瑄. "A Study of Analysis for Android Applications Security Detection." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/8r6j3j.
Full textCosta, Sara Silva. "Security threats management in android systems." Master's thesis, 2017. http://hdl.handle.net/1822/55037.
Full textUgalde, Diego Salas. "Android app for Automatic Web Page Classification : Analysis of Text and Visual Features." Master's thesis, 2015. http://hdl.handle.net/10316/41703.
Full textChen, Yu-Ling, and 陳祐翎. "A Platform of Integrating Security Analysis Tools for Android Applications." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/nk9bq9.
Full textSyu, Sih-Cing, and 許絲晴. "On the Design and Implementation of Android Smartphone Security Analysis." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/48864262961737980291.
Full textFernandes, Ana Patrícia Nunes. "App Threat Analysis: Combining static analysis with users’ feedback to accelerate app store response to mobile threats." Master's thesis, 2018. http://hdl.handle.net/10362/98808.
Full text(9728690), Ayush Maharjan. "Ranking of Android Apps based on Security Evidences." Thesis, 2021.
Find full textHsieh, Yi-Chen, and 謝宜蓁. "Security Analysis of Android Application-a Case Study of CloudBox Application." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/vx5rz9.
Full textRebenich, Niko. "Fast Low Memory T-Transform: string complexity in linear time and space with applications to Android app store security." Thesis, 2012. http://hdl.handle.net/1828/3924.
Full textShih, Cheng-yen, and 施承諺. "Cloud Digital Classroom Information Security Risk Analysis as An Example - Citrix Xen App." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/73747459870678674587.
Full textWang, Shih-Shien, and 王詩賢. "The Study on the Key Factors the Content and Practical of Android Free App by Using Content Analysis—Hot App Lifestyle Type of Google Play Store." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/cu8c8y.
Full text(10732161), Yung Han Yoon. "A FRAMEWORK FOR THE SOFTWARE SECURITY ANALYSIS OF MOBILEPOWER SYSTEMS." Thesis, 2021.
Find full textChowdhury, Nahida Sultana. "A Security Related and Evidence-Based Holistic Ranking and Composition Framework for Distributed Services." Thesis, 2021. http://dx.doi.org/10.7912/C2/7.
Full text(8800973), Kelsey Billups. "New and Emerging Mobile Apps Among Teens - Are Forensic Tools Keeping Up?" Thesis, 2020.
Find full text