메뉴 건너뛰기




Volumn 2014, Issue , 2014, Pages

An Analysis of Security System for Intrusion in Smartphone Environment

Author keywords

[No Author keywords available]

Indexed keywords

ARTICLE; COMPUTER SECURITY; COMPUTER VIRUS; DATA PROCESSING; INTERNET; MOBILE PHONE; MONITORING; PROCEDURES; DEVICES; MOBILE APPLICATION; STANDARDS; TRENDS;

EID: 84934913465     PISSN: 23566140     EISSN: 1537744X     Source Type: Journal    
DOI: 10.1155/2014/983901     Document Type: Article
Times cited : (9)

References (22)
  • 13
    • 78651065389 scopus 로고    scopus 로고
    • A study on architecture of malicious code blocking scheme with white list in smartphone environment
    • of Communications in Computer and Information Science, Springer, Berlin, Germany
    • K. Lee, R. S. Tolentino, G.-C. Park, and Y.-T. Kim, "A study on architecture of malicious code blocking scheme with white list in smartphone environment", in Communication and Networking, vol. 119 of Communications in Computer and Information Science, pp. 155-163, Springer, Berlin, Germany, 2010.
    • (2010) Communication and Networking , vol.119 , pp. 155-163
    • Lee, K.1    Tolentino, R.S.2    Park, G.-C.3    Kim, Y.-T.4
  • 16
    • 84860281488 scopus 로고    scopus 로고
    • Robotdroid: A lightweightmalware detection framework on smartphones
    • M. Zhao, T. Zhang, F. Ge, and Z. Yuan, "Robotdroid: a lightweightmalware detection framework on smartphones", Journal of Networks, vol. 7, no. 4, pp. 715-722, 2012.
    • (2012) Journal of Networks , vol.7 , Issue.4 , pp. 715-722
    • Zhao, M.1    Zhang, T.2    Ge, F.3    Yuan, Z.4
  • 19
    • 84934970802 scopus 로고    scopus 로고
    • Android malware. A study of known and potential malware threats
    • T. Vennon, "Android malware. A study of known and potential malware threats", SMobile Global Threat Centre, 2010.
    • (2010) SMobile Global Threat Centre
    • Vennon, T.1
  • 22
    • 48349087890 scopus 로고    scopus 로고
    • Code obfuscation techniques for metamorphic viruses
    • J. Borello and L. Mé, "Code obfuscation techniques for metamorphic viruses", Journal in Computer Virology, vol. 4, no. 3, pp. 211-220, 2008.
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 211-220
    • Borello, J.1    Mé, L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.