2017 IEEE 31st International Conference on Advanced Information Networking and Applications (AINA) 2017
DOI: 10.1109/aina.2017.49
|View full text |Cite
|
Sign up to set email alerts
|

Malicious Apps May Explore a Smartphone's Vulnerability to Detect One’s Activities

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…The last years, many vendors extended their product portfolio to include emergency Lately, a number of researches [241], [242], [243] has highlighted the need for increased security in NG9-1-1 environments. A major problem in this area has to do with the different media which may be negotiated by the various network entities.…”
Section: Future Directionsmentioning
confidence: 99%
“…The last years, many vendors extended their product portfolio to include emergency Lately, a number of researches [241], [242], [243] has highlighted the need for increased security in NG9-1-1 environments. A major problem in this area has to do with the different media which may be negotiated by the various network entities.…”
Section: Future Directionsmentioning
confidence: 99%