2014
DOI: 10.1109/surv.2013.101613.00077
|View full text |Cite
|
Sign up to set email alerts
|

Evolution, Detection and Analysis of Malware for Smart Devices

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
125
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 212 publications
(125 citation statements)
references
References 87 publications
0
125
0
Order By: Relevance
“…Existing smartphone security surveys review the state of the art regarding popular mobile OS platforms [46,41]. In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android.…”
Section: Related Workmentioning
confidence: 99%
“…Existing smartphone security surveys review the state of the art regarding popular mobile OS platforms [46,41]. In particular, La Polla et al [41] surveyed smartphone security threats and their solutions for the period 2004-2011, but has very limited coverage of Android.…”
Section: Related Workmentioning
confidence: 99%
“…The application will be used by either people with disability to discover technologies that are available, or by industries and healthcare professionals to assist their clients with disability in their daily lives. Considering the proliferation of smart technology over recent years [45], it is anticipated that by applying SoS to disability through the SmartDisability Framework, disability can become 'Smart' to potentially improve quality of life and provide independence.…”
Section: Discussionmentioning
confidence: 99%
“…However, all of the security threats that can occur on a PC can also occur on smartphones. Moreover, important personal information is stored on smartphones and an open development environment means that the production and dissemination of malicious codes can easily occur [21]. Therefore, in the future Internet environment, mechanisms and security methods to prevent such issues are required.…”
Section: Threat Analysis and Considerations For The Future Internetmentioning
confidence: 99%