Lima et al., 2018 - Google Patents
An Introduction to Mobile Device SecurityLima et al., 2018
- Document ID
- 2198208020504526188
- Author
- Lima A
- Borges P
- Sousa B
- Simões P
- Cruz T
- Publication year
- Publication venue
- Mobile Apps Engineering
External Links
Snippet
Mobile device capabilities have increased dramatically over the past decade, allowing users to carry a sophisticated mix of computing power and connectivity options, in a diversity of convenient form-factors (eg, wearables, smartphones, tablets). This evolution has made it …
- 230000001965 increased 0 abstract description 9
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0209—Architectural arrangements, e.g. perimeter networks or demilitarized zones
- H04L63/0218—Distributed architectures, e.g. distributed firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
- H04W12/08—Access security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12026261B2 (en) | Quarantine of software by an evaluation server based on authenticity analysis of user device data | |
EP3706022B1 (en) | Permissions policy manager to configure permissions on computing devices | |
US12081540B2 (en) | Configuring access to a network service based on a security state of a mobile device | |
Suarez-Tangil et al. | Evolution, detection and analysis of malware for smart devices | |
Shabtai et al. | Google android: A state-of-the-art review of security mechanisms | |
US9787681B2 (en) | Systems and methods for enforcing access control policies on privileged accesses for mobile devices | |
US9609020B2 (en) | Systems and methods to enforce security policies on the loading, linking, and execution of native code by mobile applications running inside of virtual machines | |
Spensky et al. | Sok: Privacy on mobile devices–it’s complicated | |
US20130312058A1 (en) | Systems and methods for enhancing mobile security via aspect oriented programming | |
US20140157355A1 (en) | Systems and methods for enhancing mobile device security with a processor trusted zone | |
Zaidi et al. | A survey on security for smartphone device | |
Dye et al. | A standard for developing secure mobile applications | |
Sikder et al. | A survey on android security: development and deployment hindrance and best practices | |
Schmidt | Detection of smartphone malware | |
WO2015013410A2 (en) | Systems and methods for enhancing mobile security via aspect oriented programming | |
KR20160145574A (en) | System and method for enforcing security in mobile computing | |
Gupta et al. | A risk-driven model to minimize the effects of human factors on smart devices | |
Jeong et al. | SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform | |
Saha et al. | Review of considerations for mobile device based secure access to financial services and risk handling strategy for CIOs, CISOs and CTOs | |
Lima et al. | An Introduction to Mobile Device Security | |
Goel et al. | Overview of smartphone security: Attack and defense techniques | |
Muttik | Securing mobile devices: Present and future | |
Abdul Kadir et al. | Android Operating System | |
Gorbāns et al. | The Myths of and Solutions for Android OS Controlled and Secure Environment | |
Brooks et al. | Secure the edge? Understanding the risk towards wireless grids Edgeware technology |