Threat analysis of smart mobile device

被引:0
|
作者
Pu, Shi [1 ]
Chen, Zhouguo [1 ]
Huang, Chen [1 ]
Liu, Yiming [1 ]
Zen, Bing [1 ]
机构
[1] Science and Technology on Communication Security Laboratory, 610041, China
关键词
Anti-malware - Mobile softwares - Number of services - Threat analysis - Trojans;
D O I
6929439
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Threat Modeling the Cloud Computing, Mobile Device Toting, Consumerized Enterprise - an overview of considerations
    Ingalsbe, Jeffrey A.
    Shoemaker, Dan
    Mead, Nancy R.
    AMCIS 2011 PROCEEDINGS, 2011,
  • [42] Security Analysis of Mobile Device-to-Device Network Applications
    Liu, Kecheng
    Shen, Wenlong
    Cheng, Yu
    Cai, Lin X.
    Li, Qing
    Zhou, Sheng
    Niu, Zhisheng
    IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02): : 2922 - 2932
  • [43] THREAT PREVENTION & VULNERABILITY ANALYSIS OF SMART CONTRACTS IN BLOCKCHAIN NETWORKS
    Chandra, Pankaj
    Soni, Santosh
    Gupta, Akanksha
    Kumar, Prayas
    Raj, Kunal
    SURANAREE JOURNAL OF SCIENCE AND TECHNOLOGY, 2023, 30 (05):
  • [44] VPNFilter Malware Analysis on Cyber Threat in Smart Home Network
    Sicato, Jose Costa Sapalo
    Sharma, Pradip Kumar
    Loia, Vincenzo
    Park, Jong Hyuk
    APPLIED SCIENCES-BASEL, 2019, 9 (13):
  • [45] PROJECT AND ANALYSIS OF A SMART DEVICE FOR DRUG DOSING
    Wodarski, P.
    Gruszka, G.
    Jurkojc, J.
    Chrzan, M.
    Burkacki, M.
    Suchon, S.
    Gzik, M.
    ENGINEERING MECHANICS 2020 (IM2020), 2020, : 532 - 535
  • [46] The Mobile Infections Threat
    不详
    IEEE SPECTRUM, 2009, 46 (05) : 12 - 12
  • [47] Unmanned Aerial Vehicle Smart Device Ground Control Station Cyber Security Threat Model
    Mansfield, Katrina
    Eveleigh, Timothy
    Holzer, Thomas H.
    Sarkani, Shahryar
    2013 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2013, : 722 - 728
  • [48] Privacy Threat Analysis of Mobile Social Network Data Publishing
    Abawajy, Jemal H.
    Ninggal, Mohd Izuan Hafez
    Al Aghbari, Zaher
    Darem, Abdul Basit
    Alhashmi, Asma
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 239 : 60 - 68
  • [49] Neural Model Stealing Attack to Smart Mobile Device on Intelligent Medical Platform
    Zhang, Liqiang
    Lin, Guanjun
    Gao, Bixuan
    Qin, Zhibao
    Tai, Yonghang
    Zhang, Jun
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2020, 2020 (2020):
  • [50] Resource-aware mobile device applications - Smart clients know their limitations
    Gopal, H
    DR DOBBS JOURNAL, 2006, 31 (03): : 10 - +