Ammari et al., 2014 - Google Patents
MOBILE SECURITY: SECURITY MECHANISMS AND PROTECTION OF MOBILE APPLICATIONS.Ammari et al., 2014
View PDF- Document ID
- 18401384113223659292
- Author
- Ammari N
- Ghallali M
- EL KALAM A
- EL HAMI N
- OUAHMAN A
- EL OUAHIDI B
- Publication year
- Publication venue
- Journal of Theoretical & Applied Information Technology
External Links
Snippet
The main objective of this paper is to propose security policies and mechanisms for mobile phones that better meet the expectations of users, either at the level of mobile networks, or mobile applications. At the mobile networks level: The study focuses on limiting the spread …
- 238000005516 engineering process 0 description 17
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges
- H04M1/66—Substation equipment, e.g. for use by subscribers; Analogous equipment at exchanges with means for preventing unauthorised or fraudulent calling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Supervisory, monitoring, management, i.e. operation, administration, maintenance or testing arrangements
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M15/00—Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shafiq et al. | The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks | |
US11201883B2 (en) | System, method, and apparatus for data loss prevention | |
US10462188B2 (en) | Computer network security system | |
Eslahi et al. | BYOD: Current state and security challenges | |
US9065800B2 (en) | Dynamic user identification and policy enforcement in cloud-based secure web gateways | |
US9973534B2 (en) | Methods and systems for secure network connections | |
US20070177615A1 (en) | Voip security | |
US11812261B2 (en) | System and method for providing a secure VLAN within a wireless network | |
US20160232349A1 (en) | Mobile malware detection and user notification | |
JP2005523640A (en) | System and method for managing wireless devices in an enterprise | |
Rathore | Ethical hacking & security against cyber crime | |
Ammari et al. | MOBILE SECURITY: SECURITY MECHANISMS AND PROTECTION OF MOBILE APPLICATIONS. | |
Milligan et al. | Business risks and security assessment for mobile devices | |
Wibowo et al. | Mobile security: Suggested security practices for malware threats | |
Androulidakis et al. | Industrial espionage and technical surveillance counter measurers | |
Lange et al. | Wherever I May Roam: Stealthy Interception and Injection Attacks Through Roaming Agreements | |
Ghallali et al. | Security of mobile phones: Prevention methods for the spread of malware | |
Copeland et al. | Securing enterprise mobile information | |
Al-Shebami et al. | Wireless LAN security | |
Ali et al. | Cyber Security: Challenges, Threats and Protective Measures of an Organization | |
Demblewski | Security frameworks for machine-to-machine devices and networks | |
GHALLALI et al. | MOBILE SECURITY: DESIGNING A NEW FRAMEWORK LIMITING MALWARE SPREAD IN THE MOBILE CLOUD COMPUTING. | |
Alquhayz et al. | Security management system for 4G heterogeneous networks | |
Anwar et al. | Mining mobile security concerns and their solutions | |
Bugshan | An overview of current security threats and existing solutions in Fog Computing |