29 resultados para applicazione android tecnologie crowdsourcing traffico stradale smartphones sensori di rilevamento floating car data


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Tracking services play a fundamental role in the smartphone ecosystem. While their primary purpose is to provide a smartphone user with the ability to regulate the extent of sharing private information with external parties, these services can also be misused by advertisers in order to boost revenues. In this paper, we investigate tracking services on the Android and iOS smartphone platforms. We present a simple and effective way to monitor traffic generated by tracking services to and from the smartphone and external servers. To evaluate our work, we dynamically execute a set of Android and iOS applications, collected from their respective official markets. Our empirical results indicate that even if the user disables or limits tracking services on the smartphone, applications can by-pass those settings and, consequently, leak private information to external parties. On the other hand, when testing the location 'on' setting, we notice that generally location is not tracked.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Android is a new generation of an open operating system directed at mobile devices that are carried every day. The openness of this architecture is leading to new applications and opportunities including a host of multimedia services, new interfaces and browsers, multitasking including support for wireless local, personal and wide area networking services. Security with mobility and wireless connectivity thus becomes even more important with all these exciting developments. Vital security issues such as leakage of private information, file stealing and spambots abound in networks in practice and Android networks continue to be subject to these same families of vulnerabilities. This paper provides a demonstration of such vulnerabilities in spite of the best efforts of designers and implementers. In particular it describes examples of data leakage and file stealing (address books, contact lists, SMS messages, pictures) as well as demonstrating how Android devices can create spambots. © 2013 IEEE.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The use of tracking settings in smartphones facilitates the provision of tailored services to users by allowing service providers access to unique identifiers stored on the smartphones. In this paper, we investigate the 'tracking off' settings on the Blackberry 10 and Windows Phone 8 platforms. To determine if they work as claimed, we set up a test bed suitable for both operating systems to capture traffic between the smartphone and external servers. We dynamically execute a set of similar Blackberry 10 and Windows Phone 8 applications, downloaded from their respective official markets. Our results indicate that even if users turn off tracking settings in their smartphones, some applications leak unique identifiers without their knowledge. © 2014 Springer International Publishing Switzerland.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

On Friday evening I saw one of the finest theatre performances from an actor. Her subtle movements, her natural cadence, her ability to portray her character in a way that demonstrated diligent devotion, careful analysis and measured construction, was simply awe-inspiring. Which actor gave this fine performance? It was an android.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

An Android application uses a permission system to regulate the access to system resources and users' privacy-relevant information. Existing works have demonstrated several techniques to study the required permissions declared by the developers, but little attention has been paid towards used permissions. Besides, no specific permission combination is identified to be effective for malware detection. To fill these gaps, we have proposed a novel pattern mining algorithm to identify a set of contrast permission patterns that aim to detect the difference between clean and malicious applications. A benchmark malware dataset and a dataset of 1227 clean applications has been collected by us to evaluate the performance of the proposed algorithm. Valuable findings are obtained by analyzing the returned contrast permission patterns. © 2013 Elsevier B.V. All rights reserved.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

As the risk of malware is sharply increasing in Android platform, Android malware detection has become an important research topic. Existing works have demonstrated that required permissions of Android applications are valuable for malware analysis, but how to exploit those permission patterns for malware detection remains an open issue. In this paper, we introduce the contrasting permission patterns to characterize the essential differences between malwares and clean applications from the permission aspect. Then a framework based on contrasting permission patterns is presented for Android malware detection. According to the proposed framework, an ensemble classifier, Enclamald, is further developed to detect whether an application is potentially malicious. Every contrasting permission pattern is acting as a weak classifier in Enclamald, and the weighted predictions of involved weak classifiers are aggregated to the final result. Experiments on real-world applications validate that the proposed Enclamald classifier outperforms commonly used classifiers for Android Malware Detection.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

 Mobile platform security solution has become especially important for mobile computing paradigms, due to the fact that increasing amounts of private and sensitive information are being stored on the smartphones' on-device memory or MicroSD/SD cards. This paper aims to consider a comparative approach to the security aspects of the current smartphone systems, including: iOS, Android, BlackBerry (QNX), and Windows Phone.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Featuring a life-like humanoid robot, Seinendan Theatre Company (Japan) brought their performance Sayonara: Android-Human Theatre to Melbourne in August 2012. Geminoid F, an android, starred alongside Canadian actress Bryerly Long, in a performance that asks the question: What does life and death mean for humans as opposed to robots?

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Better managing diabetes has become a global priority, especially given the exponential increase in the number of diabetes patients and the financial implications of treating this silent epidemic. In this paper, we focus on how it might be possible to use a mobile technology solution to support and enable superior diabetes monitoring and management. To test this solution, we examined the context of gestational diabetes and adopted a non-blinded randomized control trial with two-arm cross over applied to a private hospital in Victoria, Australia. Further, we use an accountable care system as the theoretical lens and, from this, develop a conceptual framework to bridge evidence-based management with technologies. Theoretically, we unpack McCleallan, McKethan, Lewis, Roski, and Fisher’s (2010) study with our conceptual framework that comprises providers for information (evidence-based management) and technology (smartphone). We enhance Muhlestein, Croshaw, Merrill, Pena, and James’ (2013) accountable care paradigm with three concepts: 1) quality of life, 2) evidence-based management, and 3) affordable care. From the perspective of practice, far-reaching implications have arisen particularly for hospital management pertaining to the cost and quality of care issues. In particular, it appears that adapting mobile technology solutions such as smartphones to support various aspects of care and patient-clinician interactions is a prudent choice to minimize costs and yet provide highquality care.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A low-cost system to generate, control and detect electrochemiluminescence using a mobile smartphone is described. A simple tone-detection integrated circuit is used to switch power sourced from the phone's Universal Serial Bus (USB) 'On-The-Go' (OTG) port, using audible tone pulses played over the device's audio jack. We have successfully applied this approach to smartphones from different manufacturers and with different operating system versions. ECL calibrations of a common luminophore, tris(2,2′-bipyridine)ruthenium(II) ([Ru(bpy)3]2+), with 2-(dibutylamino)ethanol (DBAE) as a co-reactant, showed no significant difference in light intensities when an electrochemical cell was controlled by a mobile phone in this manner, compared to the same calibration generated using a conventional potentiostat. Combining this novel approach to control the applied potential with the measurement of the emitted light through the smart phone camera (using an in-house built Android app), we explored the ECL properties of a water-soluble iridium(III) complex that emits in the blue region of the spectrum. The iridium(III) complex exhibited superior co-reactant ECL intensities and limits of detection to that of the conventional [Ru(bpy)3]2+ luminophore.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mobile virtualization has emerged fairly recently and is considered a valuable way to mitigate security risks on Android devices. However, major challenges in mobile virtualization include runtime, hardware, resource overhead, and compatibility. In this paper, we propose a lightweight Android virtualization solution named Condroid, which is based on container technology. Condroid utilizes resource isolation based on namespaces feature and resource control based on cgroups feature. By leveraging them, Condroid can host multiple independent Android virtual machines on a single kernel to support mutilple Android containers. Furthermore, our implementation presents both a system service sharing mechanism to reduce memory utilization and a filesystem sharing mechanism to reduce storage usage. The evaluation results on Google Nexus 5 demonstrate that Condroid is feasible in terms of runtime, hardware resource overhead, and compatibility. Therefore, we find that Condroid has a higher performance than other virtualization solutions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With Web 2.0 providing a greater interaction among web users, crowdsourcing has received great attention from both practitioners and scholars over the years. Crowdsourcing is defined as the process of outsourcing tasks once done by employees to an undefined network of people in the form of an open call. While crowdsourcing is mainly used in a business context, it is applicable to many other areas, including research and education. This book provides a diversity of studies in crowdsourcing, covering its definition and how it is related to other concepts, such as citizen empowerment. It examines the components of a crowdsourcing system and their interaction. The application of crowdsourcing across difference areas, including tourism and education, will have great potential of development in the near future.