메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1468-1473

Emerging security threats for mobile platforms

Author keywords

[No Author keywords available]

Indexed keywords

COMPLETE CONTROL; INTERNET CONNECTION; LOCATION INFORMATION; MALICIOUS ATTACK; MOBILE DEVICE SECURITY; MOBILE NETWORK TECHNOLOGY; MOBILE OPERATING SYSTEMS; MOBILE PLATFORM; SECURITY AND PRIVACY; SECURITY BREACHES; SECURITY THREATS; SMS MESSAGES; STATE OF THE ART; SYMBIAN; TECHNOLOGICAL FEATURE; THREAT MITIGATION; TROJAN HORSE; WI FI NETWORKS;

EID: 80052297069     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (60)

References (17)
  • 1
    • 80052294635 scopus 로고    scopus 로고
    • The tipping point: Cybercriminals targeting mobile platforms
    • Cisco Systems Inc.
    • Cisco Systems Inc., "The Tipping Point: Cybercriminals Targeting Mobile Platforms", Cisco Annual Security Report 2010, http://www.cisco.com/ en/US/prod/collateral/vpndevc/security-annual-report-2010.pdf.
    • (2010) Cisco Annual Security Report
  • 2
    • 80052285957 scopus 로고    scopus 로고
    • Georgia Tech Information Security Center, October
    • M. Ahmad, et al., "Emerging Cyber Threats Report for 2011", Georgia Tech Information Security Center, October 2010, http://www.gtisc.gatech. edu/pdf/cyberThreatReport2011.pdf.
    • (2010) Emerging Cyber Threats Report for 2011
    • Ahmad, M.1
  • 3
    • 79952934572 scopus 로고    scopus 로고
    • International Telecommunication Union
    • International Telecommunication Union, "The World in 2010: ICT Facts and Figures", 2010, http://www.itu.int/ITU-D/ict/material/ FactsFigures2010.pdf.
    • (2010) The World in 2010: ICT Facts and Figures
  • 5
    • 18144370814 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt, "Mobile phones: the next frontier for hackers?", IEEE Computer, vol. 2 no. 4, April 2005, pp. 20-23. (Pubitemid 40608419)
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 7
    • 78149398574 scopus 로고    scopus 로고
    • Google I/O 2008, May
    • J. Chen, "An Introduction to Android", Google I/O 2008, May 2008, http://androidgroup.googlecode.com/files/Introduction%20to%20Android.pdf.
    • (2008) An Introduction to Android
    • Chen, J.1
  • 10
    • 67049128150 scopus 로고    scopus 로고
    • Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery
    • R. Racic, "Exploiting mms vulnerabilities to stealthily exhaust mobile phone's battery", In SecureComm 06, 2006, pp. 1-10.
    • (2006) SecureComm 06 , pp. 1-10
    • Racic, R.1
  • 13
    • 80052289817 scopus 로고    scopus 로고
    • F-Secure Worm, iPhoneOS/Ikee.B
    • F-Secure, Worm:iPhoneOS/Ikee.B, http://www.f-secure.com/vdescs/worm- iphoneos-ikee-b.shtml.
  • 15
    • 25144441646 scopus 로고    scopus 로고
    • Google Android
    • Google Android, "The Developer's Guide", http://developer. android.com/guide/index.html.
    • The Developer's Guide
  • 16
    • 77950675112 scopus 로고    scopus 로고
    • A comprehensive security assessment
    • Google Android, March-April
    • A. Shabtai, et al., Google Android: "A Comprehensive Security Assessment", IEEE Security & Privacy, vol. 8, no. 2, March-April 2010, pp. 35-44.
    • (2010) IEEE Security & Privacy , vol.8 , Issue.2 , pp. 35-44
    • Shabtai, A.1
  • 17
    • 80052290123 scopus 로고    scopus 로고
    • Apple inc., iOS Reference Library, Security Overview
    • Apple inc., iOS Reference Library, Security Overview, http://developer.apple.com/library/ios/#documentation/Security/Conceptual/ Security-Overview/Introduction/Introduction.html#//apple-ref/doc/uid/ TP30000976-CH201-TPXREF101


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.