메뉴 건너뛰기




Volumn , Issue , 2008, Pages 1-409

Mobile Malware Attacks and Defense

(1)  Dunham, Ken a  

a NONE

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85153841107     PISSN: None     EISSN: None     Source Type: Book    
DOI: 10.1016/B978-1-59749-298-0.X0001-8     Document Type: Book
Times cited : (27)

References (9)
  • 1
    • 84882215469 scopus 로고    scopus 로고
    • FBI uses cellphones to eavesdrop on suspects - even when they're off
    • [Accessed: June 7th, 2008], URL:
    • K Coughlin (2006) FBI uses cellphones to eavesdrop on suspects - even when they're off. The Seattle Times www.policeone.com/police-products/radios/surveillance-accessories/articles/1197457/ [Accessed: June 7th, 2008] URL:
    • (2006) The Seattle Times
    • Coughlin, K.1
  • 3
    • 85153817864 scopus 로고    scopus 로고
    • (requires registration) [Accessed: June 7th, 2008], URL:
    • Harrington (2007) Signal Isolation http://mobile-examiner.com/vb/showthread.php?p=39 (requires registration) [Accessed: June 7th, 2008] URL:
    • (2007) Signal Isolation
  • 4
    • 84882233101 scopus 로고    scopus 로고
    • [Accessed: July 17th, 2008]
    • D. Naccache (2007) Forensics and mobile communications www.lsec.be/upload_directories/documents/3ForensicsandMobileCommunications_DavidNaccache.pdf [Accessed: July 17th, 2008]
    • (2007) Forensics and mobile communications
    • Naccache, D.1
  • 6
    • 77952255373 scopus 로고    scopus 로고
    • Singapore: COSEINC Advanced Malware Labs, [Accessed: July 17th, 2008], URL:
    • J. Rutkowska Joanna (2007) Beyond the CPU: Defeating Hardware-Based RAM Acquisition Singapore: COSEINC Advanced Malware Labs http://i.i.com.com/cnwk.1d/i/z/200701/bh-dc-07-Rutkowska-ppt.pdf [Accessed: July 17th, 2008] URL:
    • (2007) Beyond the CPU: Defeating Hardware-Based RAM Acquisition
    • Rutkowska, J.1
  • 7
    • 84882193593 scopus 로고    scopus 로고
    • USA, CA: Symantec, [Accessed: July 17th, 2008], URL:
    • Symantec (2005) SymbOS.Commwarrior.A. Symantec security response USA, CA: Symantec www.symantec.com/security_response/writeup.jsp?docid=2005-030721-2716-99&tabid=2 [Accessed: July 17th, 2008] URL:
    • (2005) SymbOS.Commwarrior.A. Symantec security response
  • 8
    • 84882204105 scopus 로고    scopus 로고
    • Cupertino, CA: Trend-Micro, [Accessed: June 7th, 2008], Security Advisories. URL:
    • Trend-Micro (2007) Vulnerability in Internet Explorer for Windows Mobile Cupertino, CA: Trend-Micro www.trendmicro.com/vinfo/secadvisories/default6.asp?VName=Vulnerability+in+Internet+Explorer+for+Windows+Mobile [Accessed: June 7th, 2008] Security Advisories. URL:
    • (2007) Vulnerability in Internet Explorer for Windows Mobile


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.