1,078 research outputs found
Static Analysis of Android Secure Application Development Process with FindSecurityBugs
Mobile devices have been growing more and more powerful in recent decades, evolving from a simple device for SMS messages and phone calls to a smart device that can install third party apps. People are becoming more heavily reliant on their mobile devices. Due to this increase in usage, security threats to mobile applications are also growing explosively. Mobile app flaws and security defects can provide opportunities for hackers to break into them and access sensitive information. Defensive coding needs to be an integral part of coding practices to improve the security of our code.
We need to consider data protection earlier, to verify security early in the development lifecycle, rather than fixing the security holes after malicious attacks and data leaks take place. Early elimination of known security vulnerabilities will help us increase the security of our software, reduce the vulnerabilities in the programs, and mitigate the consequences and damage caused by potential malicious attacks.
However, many software developer professionals lack the necessary security knowledge and skills at the development stage, and secure mobile software development is not yet well represented in most schools\u27 computing curriculum.
In this paper, we present a static security analysis approach with the FindSecurityBugs plugin for Android secure mobile software development based on OWASP mobile security recommendations to promote secure mobile software development education and meet the emerging industrial and educational needs
Application Analysis of Artificial Intelligence in Computer Network Technology
Artificial Intelligence (AI) is a kind of intelligent behavior similar to human being which helps human being to participate in dangerous and complicated work directly. The effective application of computer network technology has changed people's production and life style, and technological innovation has paid more attention to intelligence and humanity, leading to that artificial intelligence has become a development trend. This paper analyzes the general situation of artificial intelligence and its application and future development in computer network technology, hoping to provide help for related work
Lumped Mass Finite Element Method of BBM Equation on Rectangular Mesh
In this paper, the full-discrete approximation scheme of the lumped mass nonconforming finite element method for the
nonlinear BBM equation is discussed on rectangular meshes. Firstly, we study the Crank-Nicolson full-discrete approximation scheme of the
lumped mass fi nite element method for the discussed problem. Secondly, error analysis between the solution of the BBM equation and the
solution of the approximated scheme are discussed. Without using traditional elliptic projection operator, the optimal error estimations are
obtained on anisotropic meshes
A Study on the Sustainable Development Strategy for Cultural Brands from the Perspective of All Media
The era of all media, as a new cognitive background connecting together everything, provides a new perspective for the operation and communication of cultural brands. Taking the connection between all media and cultural brands as the entry point, this paper discusses how to operate cultural brands in a reasonable and efficient manner. On the one hand, the task is on the construction and communication of cultural brands themselves, focusing on the cultural connotations of their brands and the integration of their marketing with multimedia resources; on the other hand, the operation strategy needs to be further improved, such as the innovation of operation concept, balance of brand layout and creation of brand differentiation advantages. In the context of the era of all-media integration, cultural brands create a more comprehensive and three-dimensional communication mode in a more diversified form. Choosing cross-media and multimedia for brand planning and operation is an inevitable choice
Inhibitors and Activators of SOD, GSH‐Px, and CAT
Reactive oxygen species (ROS) is harmful to our health, and SOD, CAT, and GPX are the major antioxidant enzymes that defend us from effects of ROS. In medicine, food, and dairy industries, antioxidant enzymes often surround complex environments. For better utilization of these enzymes, the inhibitors (including competitive inhibitors and noncompetitive inhibitors) and activators of SOD, CAT, and GPX are descripted in detail in this chapter. Also, the structure and catalytic mechanism of these antioxidants are summarized
Report on assessment and management advice for 2004 of the anchovy fishery in the Yellow Sea
The Bei Dou Fisheries Management Project 2001-2005; Institute of Marine Research, Bergen, April 24-30, 200
Report on assessment and management advice for 2004 of the anchovy fishery in the Yellow Sea
The Bei Dou Fisheries Management Project 2001-2005; Institute of Marine Research, Bergen, April 24-30, 200
Simple rejection Monte Carlo algorithm and its application to multivariate statistical inference
The Monte Carlo algorithm is increasingly utilized, with its central step
involving computer-based random sampling from stochastic models. While both
Markov Chain Monte Carlo (MCMC) and Reject Monte Carlo serve as sampling
methods, the latter finds fewer applications compared to the former. Hence,
this paper initially provides a concise introduction to the theory of the
Reject Monte Carlo algorithm and its implementation techniques, aiming to
enhance conceptual understanding and program implementation. Subsequently, a
simplified rejection Monte Carlo algorithm is formulated. Furthermore, by
considering multivariate distribution sampling and multivariate integration as
examples, this study explores the specific application of the algorithm in
statistical inference
Recommended from our members
Reversible intercalation of methyl viologen as a dicationic charge carrier in aqueous batteries.
The interactions between charge carriers and electrode structures represent one of the most important considerations in the search for new energy storage devices. Currently, ionic bonding dominates the battery chemistry. Here we report the reversible insertion of a large molecular dication, methyl viologen, into the crystal structure of an aromatic solid electrode, 3,4,9,10-perylenetetracarboxylic dianhydride. This is the largest insertion charge carrier when non-solvated ever reported for batteries; surprisingly, the kinetic properties of the (de)insertion of methyl viologen are excellent with 60% of capacity retained when the current rate is increased from 100 mA g-1 to 2000 mA g-1. Characterization reveals that the insertion of methyl viologen causes phase transformation of the organic host, and embodies guest-host chemical bonding. First-principles density functional theory calculations suggest strong guest-host interaction beyond the pure ionic bonding, where a large extent of covalency may exist. This study extends the boundary of battery chemistry to large molecular ions as charge carriers and also highlights the electrochemical assembly of a supramolecular system
- …