1 |
Android (operating system),Wikipedia, 2013.07,http://ko.wikipedia.org/wiki/%EC%95%88%EB%93%9C%EB%A1%9C%EC%9D%B4%EB%93%9C_(%EC%9A%B4%EC%98%81_%EC%B2%B4%EC%A0%9C).
|
2 |
Symantec internet security threat report, Symantec Corporation, vol.18, pp.10,Apr.2013.
|
3 |
Aubrey-Derrick Schmidt and Sahin Albayrak ,"Malicious Software for Smartphones," Technical Report, pp.19-20,Feb. 2008.
|
4 |
Sang Wook Nam, "A study on counterplan of Spyware being abused on the Web," Korea University, pp.1-47, Dec.2014.
|
5 |
e-Nara Jipyo ,The number of counseling for private information abuse, 2012.,http://www.index.go.kr/potal/main/EachDtlPageDetail.do?idx_cd=1366
|
6 |
Jin-young Kim, "2012 Mobile Market Forecasts," ROA CONSULTING, pp.6, Feb.2011.
|
7 |
Junbong Baik, MyoungHo Choi, Bumseok Hong and Eugene Park, "Variation from Smart Revolution : The Achievements and Tasks," kt economy & business research institution, pp.12, 2012.
|
8 |
SungIl Kim and Hyunna Cha, "The threats and responses of smartphone hacking," kt economy & business research institution pp.2, 2013.
|
9 |
Heongdu Park, "The first detetion of tapping-app in korea", The KyungHyang
|
10 |
Hwashin Moon, Bohong Jung, Yongsup Jeon and Jungnyou Kim, "A Survey of Mobile Malware Detection Techniques," ETRI, pp.5-7, 2013.
|
11 |
D. Samfat and R. Molva , "IDAMN: An Intrusion Detection Architecture for Mobile Networks," IEEE Journal on Selected Areas in Communications,Vol 15. ,no. 7, pp.1373-1380, Sep. 1997.
DOI
|
12 |
M. Miettinen , P. Halonen and K. Hatonen, "Host-Based Intrusion Detection for Advanced Mobile Devices," In: AINA '06: Proceedings of the 20th International Conference on Advanced Information Networking and Applications - Vol. 2 (AINA'06), Washington, DC, USA, IEEE Computer Society, pp. 72-76, 2006.
|
13 |
D.C. Nash, T.L. Martin, D.S. Ha and M.S. Hsiao , "Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices," In: PERCOMW'05: Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops, Washington, DC, USA, IEEE Computer Society, pp. 141-145, 2005.
|
14 |
G.A. Jacoby , R. Marchany and N.J.Davis IV. , "How mobile host batteries can improve network security," IEEE Security and Privacy, Vol 4., no 5.,pp. 40-49, 2006.
|
15 |
Audio, Multimedia, Bit_rate : http://en.wikipedia.org/wiki/Bit_rate
|
16 |
J. Cheng, S.H. Wong, H. Yang and S. Lu, "Smartsiren: virus detection and alert for smartphones," In: MobiSys '07: Proceedings of the 5th iternational conference on Mobile systems, applications and services, New York, NY, USA, ACM, pp. 258-271, 2007
|