Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 5 SI
Page No. 7014 - 7018

Mobile Device and Communication Security from Vulnerabilities, Malicious Attacks with its Solution

Authors : Vaibhav Gupta, Himanshu Singla, Ruhani and Poonam Nandal

References

Barnard, L., J.S. Yi, J.A. Jacko and A. Sears, 2005. An empirical comparison of use-in-motion evaluation scenarios for mobile computing devices. Intl. J. Hum. Comput. Stud., 62: 487-520.
Direct Link  |  

Chen, G. and D. Kotz, 2000. A survey of context-aware mobile computing research. Computer Science Technical Report No. TR2000-381, Dartmouth College, Hanover, NH., USA. http://www.cs.dartmouth.edu/reports/TR2000-381.pdf.

Coninx, K., K. Luyten, C. Vandervelpen, J.V.D. Bergh and B. Creemers, 2003. Dygimes: Dynamically generating interfaces for mobile computing devices and embedded systems. Proceedings of the 5th International Symposium on Mobile Human-Computer Interaction (HCI 2003), September 8-11, 2003, Springer, Udine, Italy, pp: 256-270.

Decker, P. and B. Walke, 1993. A general packet radio service proposed for GSM. GSM. Future Competitive Environ. Helsinki, Finland, 1993: 1-20.

Gikas, J. and M.M. Grant, 2013. Mobile computing devices in higher education: Student perspectives on learning with cellphones, smartphones and social media. Internet Higher Educ., 19: 18-26.
Direct Link  |  

Holma, H. and A. Toskala, 2004. WCDMA for UMTS: Radio Access for Third Generation Mobile Communications. 3rd Edn., John Wiley and Sons, New York, USA., ISBN-13: 9780470870969, Pages: 478.

Luo, T., H. Hao, W. Du, Y. Wang and H. Yin, 2011. Attacks on webview in the android system. Proceedings of the 27th Annual Conference on Computer Security Applications, December 5-9, 2011, ACM, New York, USA., ISBN:978-1-4503-0672-0, pp: 343-352.

McGraw, G. and G. Morrisett, 2000. Attacking malicious code: A report to the infosec research council. IEEE Software, 17: 33-41.

Nash, D.C., T.L. Martin, D.S. Ha and M.S. Hsiao, 2005. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. Proceedings of the Workshops on Pervasive Computing and Communications (PerCom 2005), March 8-12, 2005, IEEE, Kauai, Hawaii, USA., ISBN:0-7695-2300-5, pp: 141-145.

Sujithra, M. and G. Padmavathi, 2012. Mobile device security: A survey on mobile device threats, vulnerabilities and their defensive mechanism. Intl. J. Comput. Appl., 56: 24-24.
Direct Link  |  

Xenakis, C., 2008. Security measures and weaknesses of the GPRS security architecture. IJ. Netw. Secur., 6: 158-169.
Direct Link  |  

Zhang, X., F. Yang, Z. Liu, Z. Wang and K. Wang, 2011. Research and application of data security for mobile devices. Proceedings of the 4th IFIP-TC Conference on Computer and Computing Technologies in Agriculture (CCTA 2010), October 22-25, 2010, Springer, Nanchang, China, pp: 46-56.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved