1 |
W. Jansen and K. Scarfone, "Guidelines on Cell Phone and PDA Security," NIST, 2008.
|
2 |
A. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Tech. Rep., DAILabor, 2008.
|
3 |
M. Khapra and N. Uchat, "Mobile Worms, Viruses and Threats," Indian Institute of Technology.
|
4 |
A. Gostev, "Mobile Malware Evolution: An Overview," 2006.
|
5 |
Available at http://www.gartner.com/it/page.jsp?id=910112
|
6 |
S. Sudan, S. Drake, and B, Burke, "Worldwide Mobile Device Security 2007-2011 Forecast," IDC, 2007.
|
7 |
Available at http://www.boannews.com/media/view.asp?idx=15635&kind=1
|
8 |
A. Gostev, "Kaspersky Security Bulletin 2006: Mobile Malware," 2007.
|
9 |
Available at http://www.f-secure.com
|
10 |
"The CIO's Guide to Mobile Security," Research In Motion Limited, 2006.
|
11 |
"WAP Push Technology Overview," Openwave Systems, 2002.
|
12 |
White Paper: Protecting mobile Data and Increasing Productivity," Trend Micro, 2007.
|
13 |
K. Scarfone and J. Padgette, "Guide to Bluetooth Security," NIST, 2008.
|
14 |
"Policy and Guidance for the Use of BlackBerry by the Australian Government," Australian Government, 2006.
|
15 |
"Comparison of WAP Push and Short Message Service(SMS)," Openwave Systems, 2002.
|
16 |
"WAP Push Architectural Overview," Wireless Application Protocol Forum, 2001.
|
17 |
Available at http://www.etimes.net/Service/etimes_2007/ShellView.asp?ArticleID=2009101513203001749&LinkID=6019&newsset=IT_juyo
|
18 |
정진혁, 이형찬, 김익수, 이정현, "모바일 악성코드 현황 및 대응 방안", 한국정보보호학회 동계학술대회, 2009.
|
19 |
K. Dunham, S. Abu-Nimeh, M. Becher, S. Fogie, B. Hernacki, J. A. Morales, and C. Wright, Mobile Malware Attacks and Defense, Syngress, 2008.
|