Becher, 2009
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Becher et al. | Mobile security catching up? revealing the nuts and bolts of the security of mobile devices | |
| US20210152592A1 (en) | System and method for determining actions to counter a cyber attack on computing devices based on attack vectors | |
| Jang-Jaccard et al. | A survey of emerging threats in cybersecurity | |
| La Polla et al. | A survey on security for mobile devices | |
| Jakobsson et al. | Crimeware: understanding new attacks and defenses | |
| US9473485B2 (en) | Secure single sign-on for a group of wrapped applications on a computing device and runtime credential sharing | |
| Jeon et al. | A practical analysis of smartphone security | |
| Delac et al. | Emerging security threats for mobile platforms | |
| Chess | Security issues in mobile code systems | |
| Al-Turjman et al. | Cyber security in mobile social networks | |
| US9396325B2 (en) | Provisioning an app on a device and implementing a keystore | |
| Teufl et al. | Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) | |
| US20140040622A1 (en) | Secure unlocking and recovery of a locked wrapped app on a mobile device | |
| EP2766846A1 (en) | System and method for profile based filtering of outgoing information in a mobile environment | |
| Bianchi et al. | Exploitation and mitigation of authentication schemes based on device-public information | |
| Chimuco et al. | Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation | |
| Anisetti et al. | Security threat landscape | |
| Schmidt | Detection of smartphone malware | |
| Schmidt et al. | Malicious software for smartphones | |
| Casati et al. | The dangers of rooting: data leakage detection in android applications | |
| BalaGanesh et al. | Smart devices threats, vulnerabilities and malware detection approaches: a survey | |
| Sohr et al. | Software security aspects of Java-based mobile phones | |
| Becher | Security of smartphones at the dawn of their ubiquitousness | |
| Zhang et al. | Design and implementation of efficient integrity protection for open mobile platforms | |
| Walls et al. | A study of the effectiveness abs reliability of android free anti-mobile malware apps |