A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Smartphone malware and its propagation modeling: A survey
S Peng, S Yu, A Yang - IEEE Communications Surveys & …, 2013 - ieeexplore.ieee.org
Smartphones are pervasively used in society, and have been both the target and victim of
malware writers. Motivated by the significant threat that presents to legitimate users, we …
malware writers. Motivated by the significant threat that presents to legitimate users, we …
Understanding the spreading patterns of mobile phone viruses
We modeled the mobility of mobile phone users in order to study the fundamental spreading
patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses …
patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses …
Mobility models, traces and impact of mobility on opportunistic routing algorithms: A survey
Mobile Opportunistic Network (MON) is characterized by intermittent connectivity where
communication largely depends on the mobility pattern of the participating nodes. In MON, a …
communication largely depends on the mobility pattern of the participating nodes. In MON, a …
Smartsiren: virus detection and alert for smartphones
Smartphones have recently become increasingly popular because they provide" all-in-one"
convenience by integrating traditional mobile phones with handheld computing devices …
convenience by integrating traditional mobile phones with handheld computing devices …
Virusmeter: Preventing your cellphone from spies
Due to the rapid advancement of mobile communication technology, mobile devices
nowadays can support a variety of data services that are not traditionally available. With the …
nowadays can support a variety of data services that are not traditionally available. With the …
Exploiting social interactions in mobile systems
AG Miklas, KK Gollu, KKW Chan, S Saroiu… - International Conference …, 2007 - Springer
The popularity of handheld devices has created a flurry of research activity into new
protocols and applications that can handle and exploit the defining characteristic of this new …
protocols and applications that can handle and exploit the defining characteristic of this new …