메뉴 건너뛰기




Volumn 76 LNICST, Issue , 2012, Pages 401-414

Google android: An updated security review

Author keywords

Android; Google; Mobile devices; Security

Indexed keywords

ANDROID (OPERATING SYSTEM); COMPUTER PROGRAMMING; MIDDLEWARE; MOBILE COMPUTING; SMARTPHONES;

EID: 84975764717     PISSN: 18678211     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-29336-8_29     Document Type: Conference Paper
Times cited : (4)

References (22)
  • 1
    • 10644275203 scopus 로고    scopus 로고
    • Embedded devices next on the virus target list
    • Piercy, C.: Embedded devices next on the virus target list. Electronic Systems and Software 2(6), 42–43 (2005)
    • (2005) Electronic Systems and Software , vol.2 , Issue.6 , pp. 42-43
    • Piercy, C.1
  • 2
    • 85025685537 scopus 로고    scopus 로고
    • World mobile anti-malware products markets
    • Frost, Sullivan: World mobile anti-malware products markets. Frost and Sullivan Report # M154-74 (2007)
    • (2007) Frost and Sullivan Report # , pp. M154-M174
    • Frost, S.1
  • 3
    • 84873722513 scopus 로고    scopus 로고
    • This is not the droid you’re looking for
    • Papathanasiou, C., Percoco, N.J.: This is not the droid you’re looking for. In: DEF CON 18 (2010)
    • (2010) DEF CON , vol.18
    • Papathanasiou, C.1    Percoco, N.J.2
  • 4
    • 85025686742 scopus 로고    scopus 로고
    • Predictions 2010: Enterprise Mobility Accelerates Again
    • Pelino, M.: Predictions 2010: Enterprise Mobility Accelerates Again. Forrester (2009)
    • (2009) Forrester
    • Pelino, M.1
  • 5
    • 44649187943 scopus 로고    scopus 로고
    • Is It Finally Time to Worry about Mobile Malware?
    • Lawton, G.: Is It Finally Time to Worry about Mobile Malware? Computer 41(5), 12–14 (2008)
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1
  • 11
    • 33750962703 scopus 로고    scopus 로고
    • Mobile Malware – New Avenues
    • Emm, D.: Mobile Malware – New Avenues. Network Security 2006(11), 4–6 (2006)
    • (2006) Network Security , vol.2006 , Issue.11 , pp. 4-6
    • Emm, D.1
  • 13
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method
    • Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method. Journal of Systems and Software 83(8), 1524–1537 (2010)
    • (2010) Journal of Systems and Software , vol.83 , Issue.8 , pp. 1524-1537
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 15
    • 77950673302 scopus 로고    scopus 로고
    • Securing Android-Powered Mobile Devices Using SELinux
    • Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy 8(3), 36–44 (2010)
    • (2010) IEEE Security and Privacy , vol.8 , Issue.3 , pp. 36-44
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.