Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper presents a method of device type verification via network behavior examination. This work is compared to methods and applications like nMap or xProbe, because it is capable of discerning mobile operating systems (OS) by using both active and passive network traffic. Our approach, which is based on repeatable experiments, suggests that the three major mobile OS vendors (i.e., Android, iOS,...
The proliferation of mobile device platforms and operating systems has resulted in an increased challenge for developers and mobile users alike. While developers face fragmentation issues in their efforts, mobile users find an increasing number of online services to access in a variety of ways. The increased adoption of HTML5-based service access methods, however, allows to circumvent some of these...
Given Android's popularity, it is likely that Android devices will be targeted with increasing frequency by malware designers, in particular by programs which are designed to steal some of the sensitive personal or financial information. This threat puts an obligation on security professionals and software developers to work to ensure that the Android platform is as secure as possible. Users of mobile...
This paper presents a method of device type verification via network behavior examination. This work is compared to methods and applications like nMap or xProbe, because it is capable of discerning mobile operating systems (OS) by using both active and passive network traffic. Our approach, which is based on repeatable experiments, suggests that the three major mobile OS vendors (i.e., Android, iOS,...
The paper presents the design and implementation of a low cost and open source assistive system exploiting a wearable device in order to support deaf-blind people in communication using the Malossi alphabet. More specifically, the system, that we called GlovePi, is composed by three main low cost components, such as: (i) a gardener glove; (ii) a Raspberry Pi; (iii) a MPR121 capacitive touch sensor...
The majority of Android applications (apps) deals with user's personal data. Users trust these apps and allow them to access all sensitive data. Cryptography, when employed in an appropriate way, can be used to prevent misuse of data. Unfortunately, cryptographic libraries also include vulnerable cryptographic services. Since Android app developers may not be cryptographic experts, this makes apps...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.