Author:
Majchrzycka Aneta,Poniszewska-Maranda Aneta
Publisher
Springer International Publishing
Reference21 articles.
1. Porter Felt A., Finifter M., Chin E., Hanna S., Wagner D.: A survey of mobile malware in the wild. In: Proceedings of 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 3–14 (2011)
2. Zhou, Y., Jiang, X.: Dissecting android malware: characterization and evolution. In: Proceedings of 33rd IEEE Symposium on Security and Privacy (2012)
3. Michalska, A., Poniszewska-Maranda, A.: Security risks and their prevention capabilities in mobile application development. Inf. Syst. Manage. 4(2), 123–134 (2015)
4. Apple, iOS Security. http://images.apple.com/ipad/business/docs/iOS_Security_Feb14.pdf (2014)
5. Benedict, C.: Under the Hood: Reversing Android Applications (2001). Infosec Institute (2012)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献