A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Survey on mobile user's data privacy threats and defense mechanisms
J Khan, H Abbas, J Al-Muhtadi - Procedia Computer Science, 2015 - Elsevier
Nowadays, mobile devices have become an integral part of our daily life. These have
proven to be an advantageous scientific invention that fillspersonal and business needs in a …
proven to be an advantageous scientific invention that fillspersonal and business needs in a …
A survey of security risks of mobile social media through blog mining and an extensive literature search
W He - Information Management & Computer Security, 2013 - emerald.com
Purpose As mobile malware and virus are rapidly increasing in frequency and
sophistication, mobile social media has recently become a very popular attack vector. The …
sophistication, mobile social media has recently become a very popular attack vector. The …
A Comprehensive Survey on Hardware-Software co-Protection against Invasive, Non-Invasive and Interactive Security Threats
MH Rahman - Cryptology ePrint Archive, 2024 - eprint.iacr.org
In the face of escalating security threats in modern computing systems, there is an urgent
need for comprehensive defense mechanisms that can effectively mitigate invasive …
need for comprehensive defense mechanisms that can effectively mitigate invasive …
[PDF][PDF] 移动互联网: 终端, 网络与服务
罗军舟, 吴文甲, 杨明 - 2011 - cjc.ict.ac.cn
方便地从互联网获取信息和服务, 移动互联网应运而生并迅猛发展. 然而,
移动互联网在移动终端, 接入网络, 应用服务, 安全与隐私保护等方面还面临着一系列的挑战 …
移动互联网在移动终端, 接入网络, 应用服务, 安全与隐私保护等方面还面临着一系列的挑战 …
Rootkit detection mechanism: A survey
Rootkits are a set of software tools used by an attacker to gain unauthorized access into a
system, thereby providing him with privilege to access sensitive data, conceal its own …
system, thereby providing him with privilege to access sensitive data, conceal its own …
Analysis on maliciousness for mobile applications
SH Seo, DG Lee, K Yim - 2012 Sixth International Conference …, 2012 - ieeexplore.ieee.org
The rapid increase in smart phone users has enabled the application marketplace to grow
dramatically. The black market presence has also grown rapidly, where paid applications …
dramatically. The black market presence has also grown rapidly, where paid applications …
Techniques for analysing Android malware
OS Adebayo, NA Aziz - The 5th International Conference on …, 2014 - ieeexplore.ieee.org
The Android operating system is gaining market share on smartphones and tablets due to its
market openness and easier accessibility and operability. Therefore, it is increasingly …
market openness and easier accessibility and operability. Therefore, it is increasingly …
Characterizing evaluation practices of intrusion detection methods for smartphones
The appearance of a new Android platform and its popularity has resulted in a sharp rise in
the number of reported vulnerabilities and consequently in the number of mobile threats …
the number of reported vulnerabilities and consequently in the number of mobile threats …
[PDF][PDF] A survey on mobile malware: A war without end
S Mohite, PR Sonar - International Journal of Computer Science and …, 2014 - academia.edu
Nowadays, mobile devices have become an inseparable part of our everyday lives and its
usage has grown up exponentially. With the functionality upgrade of mobile phones, the …
usage has grown up exponentially. With the functionality upgrade of mobile phones, the …