메뉴 건너뛰기




Volumn 376 AICT, Issue , 2012, Pages 443-456

A risk assessment method for smartphones

Author keywords

Android; Risk Assessment; Security; Smartphone; Threat

Indexed keywords

ANDROID; ATTACK VECTOR; MULTI-PURPOSE; RISK ASSESSMENT METHODS; SECURITY; SECURITY THREATS; THREAT; UBIQUITOUS DEVICES; USER INPUT;

EID: 84863927277     PISSN: 18684238     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-30436-1_36     Document Type: Conference Paper
Times cited : (65)

References (21)
  • 2
    • 79955442931 scopus 로고    scopus 로고
    • Smart security
    • Caldwell, T.: Smart security. Network Security 2011(4), 5-9 (2011)
    • (2011) Network Security , vol.2011 , Issue.4 , pp. 5-9
    • Caldwell, T.1
  • 4
    • 63049137706 scopus 로고    scopus 로고
    • Information security: The moving target
    • Dlamini, M., Eloff, J., Eloff, M.: Information security: The moving target. Computers & Security 28(3-4), 189-198 (2009)
    • (2009) Computers & Security , vol.28 , Issue.3-4 , pp. 189-198
    • Dlamini, M.1    Eloff, J.2    Eloff, M.3
  • 11
    • 70449482830 scopus 로고    scopus 로고
    • Recommendations of the National Institute of Standards and Technology, Special Publication 800-124
    • Jansen, W., Scarfone, K.: Guidelines on Cell Phone and PDA Security. Recommendations of the National Institute of Standards and Technology, Special Publication 800-124 (2008)
    • (2008) Guidelines on Cell Phone and PDA Security
    • Jansen, W.1    Scarfone, K.2
  • 12
    • 79960333886 scopus 로고    scopus 로고
    • A Practical Analysis of Smartphone Security
    • Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. Springer, Heidelberg
    • Jeon, W., Kim, J., Lee, Y., Won, D.: A Practical Analysis of Smartphone Security. In: Smith, M.J., Salvendy, G. (eds.) HCII 2011, Part I. LNCS, vol. 6771, pp. 311-320. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6771 , pp. 311-320
    • Jeon, W.1    Kim, J.2    Lee, Y.3    Won, D.4
  • 13
    • 84863940460 scopus 로고    scopus 로고
    • Kaspersky Labs
    • Kaspersky Labs: IT Threat Evolution: Q3 (2011), http://www.securelist. com/en/analysis/204792201/IT-Threat-Evolution-Q3-2011
    • (2011) IT Threat Evolution: Q3
  • 14
    • 80052818132 scopus 로고    scopus 로고
    • Risk Assessment for Mobile Devices
    • Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. Springer, Heidelberg
    • Ledermüller, T., Clarke, N.L.: Risk Assessment for Mobile Devices. In: Furnell, S., Lambrinoudakis, C., Pernul, G. (eds.) TrustBus 2011. LNCS, vol. 6863, pp. 210-221. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6863 , pp. 210-221
    • Ledermüller, T.1    Clarke, N.L.2
  • 15
    • 84863964653 scopus 로고    scopus 로고
    • MSc Thesis, Royal Holloway, University of London
    • Mylonas, A.: Smartphone spying tools. MSc Thesis, Royal Holloway, University of London (2008)
    • (2008) Smartphone Spying Tools
    • Mylonas, A.1
  • 18
    • 80052863388 scopus 로고    scopus 로고
    • Security and Privacy in an Online World
    • Oppliger, R.: Security and Privacy in an Online World. Computer 44(9), 21-22 (2011)
    • (2011) Computer , vol.44 , Issue.9 , pp. 21-22
    • Oppliger, R.1
  • 19
    • 84969376625 scopus 로고    scopus 로고
    • OWASP: Top 10 Mobile Risks, http://www.owasp.org/index.php/WASP-Mobile- Security-Project
    • Top 10 Mobile Risks


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.