Author:
Mylonas Alexios,Theoharidou Marianthi,Gritzalis Dimitris
Publisher
Springer International Publishing
Reference37 articles.
1. Office of the privacy commissioner of Canada privacy impact assessments (2007).
http://www.tbs-sct.gc.ca/pol/doc-eng.aspx?id=18308
2. Methodology for privacy risk management (2012).
http://www.cnil.fr/fileadmin/documents/en/CNIL-ManagingPrivacyRisks-Methodology.pdf
3. Barrera, D., Kayacik, H., van Oorschot, P., Somayaji, A.: A methodology for empirical analysis of permission-based security models and its application to Android. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 73–84. ACM (2010)
4. Chin, E., Felt, A.P., Greenwood, K., Wagner, D.: Analyzing inter-application communication in Android. In: Proceedings of the 9th International Conference on Mobile Systems, Applications and Services, pp. 239–252. ACM, New York (2011)
5. Cluley, G.: First iPhone worm discovered - ikee changes wallpaper to Rick Astley photo, November 2009.
http://nakedsecurity.sophos.com/2009/11/08/iphone-worm-discovered-wallpaper-rick-astley-photo/
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AppFA: A Novel Approach to Detect Malicious Android Applications on the Network;Security and Communication Networks;2018-04-17
2. Android privacy C(R)ache;Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing - PAMCO '16;2016