[1]
|
Information Systems Management
|
|
2023 |
|
|
[2]
|
Comparative Study of Information Security in Mobile Operating Systems: Android and Apple iOS
|
|
Information Systems Management,
2023 |
|
|
[3]
|
SoK: Untangling File-based Encryption on Mobile Devices
|
|
arXiv preprint arXiv:2111.12456,
2021 |
|
|
[4]
|
Digital Forensics Security Analysis on iOS Devices
|
|
2021 |
|
|
[5]
|
Is Every Application That Are Using In Mobiles Are Secure?
|
|
IJSART,
2020 |
|
|
[6]
|
Caracterização de sistemas operacionais móveis celulares: Android, Symbian, iphone e Windows phone
|
|
Project Design and Management,
2019 |
|
|
[7]
|
시나리오 기반의 스마트폰 취약점에 대한 보안방안
|
|
2018 |
|
|
[8]
|
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices
|
|
International Journal of E-Services and Mobile Applications (IJESMA),
2018 |
|
|
[9]
|
시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구
|
|
2018 |
|
|
[10]
|
The Dual-Execution-Environment Approach: Analysis and Comparative Evaluation
|
|
ICT Systems Security and Privacy Protection,
2015 |
|
|
[11]
|
Crypto-Bootloader–Secure in-field firmware updates for ultra-low power MCUs
|
|
2015 |
|
|
[12]
|
A Summer Internship Project Report On Enhancing Database Security in Android Devices Carried out at the Institute for Development and Research in Banking Technology During 12th May-14th July 2014
|
|
2014 |
|
|
[13]
|
iOS 系统安全和口令破解研究
|
|
安阳师范学院学报,
2014 |
|
|
[14]
|
Android Encryption Systems
|
|
2014 |
|
|
[15]
|
An evaluation of smartphone communication (in) security
|
|
Thesis,
2014 |
|
|
[16]
|
iOS 系统数据安全分析与加固
|
|
通信技术,
2014 |
|
|
[17]
|
Smartphone privacy perceptions and behaviors generational influence quantitative analysis: Communications privacy management theory
|
|
ProQuest Dissertations Publishing,
2014 |
|
|
[18]
|
Anomaly-based intrusion detection and prevention systems for mobile devices: Design and development
|
|
2013 |
|
|
[19]
|
iOS encryption systems: Deploying iOS devices in security-critical environments
|
|
Security and Cryptography (SECRYPT), 2013 International Conference on,
2013 |
|
|
[20]
|
Mobile Device Encryption Systems
|
|
Security and Privacy Protection in Information Processing Systems,
2013 |
|
|
[21]
|
iOS Encryption Systems
|
|
2013 |
|
|
[22]
|
SIPmsign: a lightweight mobile signature service based on the Session Initiation Protocol
|
|
Software: Practice and Experience,
2012 |
|
|
[23]
|
PROPUESTA PARA TRABAJO DE GRADO
|
|
2012 |
|
|
[24]
|
iOS 系统数据安全研究
|
|
信息安全与通信保密,
2012 |
|
|
[25]
|
Exploration of attacks on current generation smartphones
|
|
Procedia Computer Science,
2011 |
|
|
[26]
|
Τεχνικ? Σ?γκριση Λειτουργικ?ν Συστημ?των Apple iOS και Google Android
|
|
2011 |
|
|
[27]
|
iSAM: an iPhone stealth airborne malware
|
|
Future Challenges in Security and Privacy for Academia and Industry,
2011 |
|
|
[28]
|
David Bayne Cluster 4 August 1, 2011
|
|
2011 |
|
|
[29]
|
Securing the use of sensitive data on remote devices using a hardware-software architecture
|
|
2010 |
|
|
[30]
|
2 Backgrounds
|
|
|
|
|