메뉴 건너뛰기




Volumn 7, Issue 4, 2014, Pages 247-256

Security considerations related to the use of mobile devices in the operation of critical infrastructures

Author keywords

Android; Critical infrastructure; Cross layer interplay; Malware; Mobile devices; Security

Indexed keywords

ANDROID (OPERATING SYSTEM); CRITICAL INFRASTRUCTURES; MALWARE; MOBILE COMPUTING; NETWORK SECURITY; PUBLIC WORKS;

EID: 84918840541     PISSN: 18745482     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijcip.2014.10.002     Document Type: Article
Times cited : (11)

References (40)
  • 1
    • 84918829173 scopus 로고    scopus 로고
    • Android Developers, Security Tips
    • Android Developers, Security Tips ().
  • 2
    • 84889049230 scopus 로고    scopus 로고
    • Ubiquitous patient monitoring and smart alert generation in an intensive care unit supported by low cost tablet PC based automation system powered through open source software
    • J. Antony, B. Vijayan, S. Joy, G. Santhoshkumar, N. Chandran, Ubiquitous patient monitoring and smart alert generation in an intensive care unit supported by low cost tablet PC based automation system powered through open source software, in: Proceedings of the Global Humanitarian Technology Conference: South Asia Satellite, 2013, pp. 334-339.
    • (2013) Proceedings of the Global Humanitarian Technology Conference: South Asia Satellite , pp. 334-339
    • Antony, J.1    Vijayan, B.2    Joy, S.3    Santhoshkumar, G.4    Chandran, N.5
  • 3
    • 84918824116 scopus 로고    scopus 로고
    • Apple, App Store Review Guidelines, Cupertino, California
    • Apple, App Store Review Guidelines, Cupertino, California (), 2013.
    • (2013)
  • 9
    • 84874123081 scopus 로고    scopus 로고
    • Anatomy and physiology of an Android
    • Google I/O
    • P. Brady, Anatomy and physiology of an Android, Google I/O, 2008.
    • (2008)
    • Brady, P.1
  • 13
    • 84918839909 scopus 로고    scopus 로고
    • Computer networks in South Korea are paralyzed in cyberattacks
    • New York Times, March 20
    • S. Choe, Computer networks in South Korea are paralyzed in cyberattacks, New York Times, March 20, 2013.
    • (2013)
    • Choe, S.1
  • 14
    • 84918792653 scopus 로고    scopus 로고
    • Fort Lauderdale, Florida
    • Citrix, IT Organizations Embrace Bring-Your-Own Devices, Fort Lauderdale, Florida, 2013.
    • (2013)
  • 15
    • 84918771846 scopus 로고    scopus 로고
    • Kill timer found in Shamoon malware suggests possible connection to Saudi Aramco attack
    • August 23
    • L. Constantin, Kill timer found in Shamoon malware suggests possible connection to Saudi Aramco attack, Computerworld, August 23, 2012.
    • (2012) Computerworld
    • Constantin, L.1
  • 17
    • 84918815181 scopus 로고    scopus 로고
    • FierceMobileIT, September 27
    • National Australia Bank hangs up on desk phones, trials BYOD, FierceMobileIT, September 27, 2013.
    • (2013)
  • 19
    • 84918813113 scopus 로고    scopus 로고
    • Tales from the darkside: Mobile malware brings down Korean banks
    • Fielder, RSA Security Analytics, March 21
    • Fielder, Tales from the darkside: Mobile malware brings down Korean banks, RSA Security Analytics, March 21, 2013.
  • 20
    • 84918803209 scopus 로고    scopus 로고
    • July-September 2013, Technical Report, Helsinki, Finland
    • F-Secure Labs, Mobile Threat Report, July-September 2013, Technical Report, Helsinki, Finland, 2013.
    • (2013)
  • 21
    • 79955904273 scopus 로고    scopus 로고
    • SCanDroid: Automated Security Certication of Android Applications
    • Technical Report, Department of Computer Science, University of Maryland, College Park, Maryland
    • A. Fuchs, A. Chaudhuri, J. Foster, SCanDroid: Automated Security Certication of Android Applications, Technical Report, Department of Computer Science, University of Maryland, College Park, Maryland, 2009.
    • (2009)
    • Fuchs, A.1    Chaudhuri, A.2    Foster, J.3
  • 22
    • 84876758444 scopus 로고    scopus 로고
    • Towards a user-friendly security-enhancing BYOD solution
    • D. Gessner, J. Girao, G. Karame, W. Li, Towards a user-friendly security-enhancing BYOD solution, NEC Tech. J. 7(3) (2013) 113-116.
    • (2013) NEC Tech. J. , vol.7 , Issue.3 , pp. 113-116
    • Gessner, D.1    Girao, J.2    Karame, G.3    Li, W.4
  • 23
    • 84918821786 scopus 로고    scopus 로고
    • Water treatment plant uses iPads to monitor systems
    • October 16
    • M. Hamblen, Haverhill, MA, Water treatment plant uses iPads to monitor systems, Computerworld, October 16, 2012.
    • (2012) Computerworld
    • Hamblen, M.1    Haverhill, M.A.2
  • 24
    • 0012583283 scopus 로고    scopus 로고
    • Featherweight Java: a minimal core calculus for Java and GJ, ACM Trans.
    • A. Igarashi, B. Pierce, P. Wadler, Featherweight Java: a minimal core calculus for Java and GJ, ACM Trans. Program. Lang. Syst. 23(3) (2001) 396-450.
    • (2001) Program. Lang. Syst. , vol.23 , Issue.3 , pp. 396-450
    • Igarashi, A.1    Pierce, B.2    Wadler, P.3
  • 25
    • 84883240396 scopus 로고    scopus 로고
    • Development of mobile radiation monitoring system utilizing smartphone and its field tests in Fukushima
    • Y. Ishigaki, Y. Matsumoto, R. Ichimiya, K. Tanaka, Development of mobile radiation monitoring system utilizing smartphone and its field tests in Fukushima, IEEE Sensors J. 13(10) (2013) 3520-3526.
    • (2013) IEEE Sensors J. , vol.13 , Issue.10 , pp. 3520-3526
    • Ishigaki, Y.1    Matsumoto, Y.2    Ichimiya, R.3    Tanaka, K.4
  • 27
    • 84865574920 scopus 로고    scopus 로고
    • Android and security, Google Mobile Blog
    • February 2
    • H. Lockheimer, Android and security, Google Mobile Blog , February 2, 2012. http://googlemobile.blogspot.com/2012/02/android-and-security.html.
    • (2012)
    • Lockheimer, H.1
  • 31
    • 84868107162 scopus 로고    scopus 로고
    • Dissecting the Android Bouncer
    • Presented at the SummerCon Conference
    • J. Oberheide, C. Miller, Dissecting the Android Bouncer, Presented at the SummerCon Conference, 2012.
    • (2012)
    • Oberheide, J.1    Miller, C.2
  • 32
    • 33745446320 scopus 로고    scopus 로고
    • Slammer worm crashed Ohio nuke plant network
    • August 19
    • K. Poulsen, Slammer worm crashed Ohio nuke plant network, SecurityFocus, August 19, 2003.
    • (2003) SecurityFocus
    • Poulsen, K.1
  • 36
    • 84918833280 scopus 로고    scopus 로고
    • Using STPA in the design of a nuclear power plant control room
    • Presented at the MIT STAMP/STPA Workshop
    • A. Stephane, Using STPA in the design of a nuclear power plant control room, Presented at the MIT STAMP/STPA Workshop, 2012.
    • (2012)
    • Stephane, A.1
  • 37
    • 84857696369 scopus 로고    scopus 로고
    • BYOD: enabling the chaos
    • G. Thomson, BYOD: enabling the chaos, Netw. Secur. 2012(2) (2012) 5-8.
    • (2012) Netw. Secur. , vol.2012 , Issue.2 , pp. 5-8
    • Thomson, G.1
  • 39
    • 84918786323 scopus 로고    scopus 로고
    • eighth edition, Cologny/Geneva, Switzerland
    • World Economic Forum, Global Risks 2013, eighth edition, Cologny/Geneva, Switzerland, 2013.
    • (2013)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.