1 |
Gartner, http://www.gartner.com/newsroom/id/2482816, May. 2013.
|
2 |
iCrossing, http://connect.icrossing.co.uk/2013-mobile-market-share-infographic_10062, Jan. 2013.
|
3 |
Trend Micro, TrendLabs 2Q 2013 Security Roundup, Apr. 2013.
|
4 |
Hye-Young Chang, Min-Jae Kim, Dong-Jin Kim, Jin-Young Lee, Hong-Kun Kim and Seong-Je Cho, "An implementation of system for detecting and filtering malicious URLs," Journal of KIISE : Computing Practices and Letters, 16(4), pp. 405-414, Apr. 2010.
과학기술학회마을
|
5 |
Content Providers, http://developer.android.com/guide/topics/providers/contentproviders.html, Feb, 2014.
|
6 |
Joon-Ho Sa and Sang-Jin Lee, "Real-time Phishing Site Detection Method," Journal of The Korea Institute of Information Security and Cryptology, 22(4), pp. 819-825, Aug. 2012.
과학기술학회마을
|
7 |
APWG, http://www.antiphishing.org, May. 2013.
|
8 |
Android Security Overview, http://source.android.com/devices/tech/security,Feb. 2014.
|
9 |
ContentObserver, http://developer.android.com/reference/android/database/ContentObserver.html, Feb, 2014.
|
10 |
Korea Communications Commission, Wired and wireless communication services subscriber statistics (At the end of January, 2013), Mar. 2013.
|