Author:
Majchrzycka Aneta,Poniszewska-Maranda Aneta
Publisher
Springer International Publishing
Reference11 articles.
1. Porter Felt, A., Finifter, M., Chin, E., Hanna, S., Wagner, D.: A survey of mobile malware in the wild. In: Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14 (2011)
2. Souppaya, M.P., Scarfone, K.A.: Guidelines for Managing the Security of Mobile Devices in the Enterprise. NIST (2013)
3. Apple, iOS Security (2014). images.apple.com/ipad/business/docs/iOS\_Security\_Feb14.pdf
4. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution, In: Proceedings of the 33rd IEEE Symposium on Security and Privacy (2012)
5. Benedict, C.: Under the Hood: Reversing Android Applications. Infosec Institute (2012)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Securing Sensitive Data in Fintech: A Case Study of eKopz with SDS Security Model Implementation;2024 2nd International Conference on Software Engineering and Information Technology (ICoSEIT);2024-02-28
2. Frameworks to Develop Secure Mobile Applications: A Systematic Literature Review;Trends and Innovations in Information Systems and Technologies;2020