2021
DOI: 10.1007/978-3-030-74575-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Classification of Cyber Security Threats on Mobile Devices and Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
3
1

Relationship

3
6

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 49 publications
0
25
0
Order By: Relevance
“…The updated DeLone and McLean model system quality (usability, functionality, interface design, accessibility, ease of use, interactivity), information quality (content adequacy, content usefulness and content design) and service quality (availability, personalization, reliability, trust and responsiveness) [37] Service quality models E-S-Qual efficiency, compliance, availability and privacy [38] WebQual model informational fit-to-task, tailored communications, trust, response time, ease of understanding, intuitive operations, visual appeal, innovativeness, emotional appeal, consistent image, online completeness, and relative advantage [39] WebQual model usability, information and interaction [39] 2.1. Software Quality Models…”
Section: Software Quality Modelsmentioning
confidence: 99%
“…The updated DeLone and McLean model system quality (usability, functionality, interface design, accessibility, ease of use, interactivity), information quality (content adequacy, content usefulness and content design) and service quality (availability, personalization, reliability, trust and responsiveness) [37] Service quality models E-S-Qual efficiency, compliance, availability and privacy [38] WebQual model informational fit-to-task, tailored communications, trust, response time, ease of understanding, intuitive operations, visual appeal, innovativeness, emotional appeal, consistent image, online completeness, and relative advantage [39] WebQual model usability, information and interaction [39] 2.1. Software Quality Models…”
Section: Software Quality Modelsmentioning
confidence: 99%
“…This is different from the traditional ICS environments that require different zoning and in-depth defense frameworks. ICS environments differ from the standard enterprise environments in many ways, and below are some of the key differences [ 47 , 48 , 49 , 50 ]. Risk level: significant impact on human lives and possibly the nation.…”
Section: Background and Related Studiesmentioning
confidence: 99%
“…The second level of FN’s latency is reduced because of IoMT device communication. As a result, users’ requirements are encountered in the proposed fog computing (FC) model [ 43 , 44 , 45 , 46 , 47 , 48 , 49 , 50 ].…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…This includes data leakage, social engineering attacks [ 1 ], jamming attacks [ 2 ], software virus security, cryptojacking attacks [ 3 ], wireless channel security, physical device violations, and user location privacy leakage. Researchers have conducted research on these security issues from security threat classification [ 4 ], security defense scheme design, security performance optimization, evaluation, etc. The research covers access domain security, network domain security, user domain security, and application domain security.…”
Section: Introductionmentioning
confidence: 99%