Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Digital Communications and Networking (3)
- Other Computer Engineering (3)
- Computer Sciences (2)
- Physical Sciences and Mathematics (2)
- Business (1)
-
- Computer Law (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Electrical and Computer Engineering (1)
- Forensic Science and Technology (1)
- Hardware Systems (1)
- Information Security (1)
- Law (1)
- Legal Studies (1)
- Management Information Systems (1)
- Other Computer Sciences (1)
- Risk Analysis (1)
- Social and Behavioral Sciences (1)
- Software Engineering (1)
- Institution
- Publication
- Publication Type
Articles 1 - 6 of 6
Full-Text Articles in Computer Engineering
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
Forensic Analysis Of Whatsapp On Android Smartphones, Neha S. Thakur
University of New Orleans Theses and Dissertations
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a …
Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee
Bluelock: A Secure Bluetooth Operated Padlock, Trever Mckee
Computer Engineering
For this project a secure, battery operated, Bluetooth operated padlock was created. The project included both the hardware to integrate with a padlock and an Android application used to interface with the hardware. In order to make the padlock secure both AES encryption and challenge response authentication were used for secure message passing between the device and the Android phone. The project also included power consumption and sustainability tuning including exploring Arduino sleep states and integrating the project with a solar charging unit.
Human Powered Vehicle Bike Computer, Eric Yaklin, Bradley Shellnut
Human Powered Vehicle Bike Computer, Eric Yaklin, Bradley Shellnut
Computer Engineering
This project is a bike computer system built for Cal Poly’s Human Powered Vehicle Team. It was designed and built using Arduino and Android programming tools. The project consists of an Arduino Uno used to collect bike data (such as speed, temperature and GPS location) and an Android Application used to display this data in real time and save it to user profiles within the application. Although many bike computers already exist, this project was specifically designed to be used in a team racing environment rather than for individual use.
Smartpark, David Cosgrove
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Trends In Android Malware Detection, Kaveh Shaerpour, Ali Dehghantanha, Ramlan Mahmod
Journal of Digital Forensics, Security and Law
This paper analyzes different Android malware detection techniques from several research papers, some of these techniques are novel while others bring a new perspective to the research work done in the past. The techniques are of various kinds ranging from detection using host based frameworks and static analysis of executable to feature extraction and behavioral patterns. Each paper is reviewed extensively and the core features of each technique are highlighted and contrasted with the others. The challenges faced during the development of such techniques are also discussed along with the future prospects for Android malware detection. The findings of the …
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Research In Progress-Defending Android Smartphones From Malware Attacks, Marwan Omar, Maurice E. Dawson Jr.
Maurice Dawson
Smart phones are becoming enriched with confidential information due to their powerful computational capabilities and attractive communications features. The Android smart phone is one of the most widely used platforms by businesses and users alike. This is partially because Android smart phones use the free, open-source Linux as the underlying operating system, which allows development of applications by any software developer. This research study aims to explore security risks associated with the use of Android smart phones and the sensitive information they contain, the researcher devised a survey questionnaire to investigate and further understand security threats targeting Android smart phones. …