메뉴 건너뛰기




Volumn 8, Issue 2, 2010, Pages 35-44

Google android: A comprehensive security assessment

Author keywords

Android; Google; Mobile devices; Risk analysis; Security; Security solutions for mobile devices

Indexed keywords

ANDROID; GOOGLE; OPERATING SYSTEMS; SECURITY ASSESSMENT; SECURITY MECHANISM; SECURITY SOLUTIONS; SOFTWARE STACKS;

EID: 77950675112     PISSN: 15407993     EISSN: None     Source Type: Journal    
DOI: 10.1109/MSP.2010.2     Document Type: Article
Times cited : (284)

References (10)
  • 1
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming
    • C. Dagon, T. Martin, and T. Starner, "Mobile Phones as Computing Devices: the Viruses Are Coming," IEEE Pervasive Computing, vol.3, no.4, 2004, pp. 11-15.
    • (2004) IEEE Pervasive Computing , vol.3 , Issue.4 , pp. 11-15
    • Dagon, C.1    Martin, T.2    Starner, T.3
  • 5
    • 33750962703 scopus 로고    scopus 로고
    • Mobile malware-new avenues
    • D. Emm, "Mobile Malware-New Avenues," Network Security, vol.2006, no.11, 2006, pp. 4-6.
    • (2006) Network Security , vol.2006 , Issue.11 , pp. 4-6
    • Emm, D.1
  • 6
    • 33747185908 scopus 로고    scopus 로고
    • Where have the worms and viruses gone? New trends in malware
    • E.E. Schultz, "Where Have the Worms and Viruses Gone? New Trends in Malware," Computer Fraud and Security, vol.2006, no.7, 2006, pp. 4-8.
    • (2006) Computer Fraud and Security , vol.2006 , Issue.7 , pp. 4-8
    • Schultz, E.E.1
  • 7
    • 22944476745 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt, "Mobile Phones: The Next Frontier for Hackers?" Computer, vol.38, no.4, 2005, pp. 20-23.
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 10
    • 77950673302 scopus 로고    scopus 로고
    • Securing android-powered mobile devices using selinux
    • to appear
    • A. Shabtai, Y. Fledel, and Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security & Privacy, to appear, 2010.
    • (2010) IEEE Security & Privacy
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.