1 |
G. Kim, Y. Jeon, and J. Kim, "Secure mobile device management based on domain separation," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 918-920.
|
2 |
S. S. Manvi, L. B. Bhajantri, and M. Vijayakumar, "Secure mobile payment system in wireless environment," in 2009 International Conference on Future Computer and Communication, 2009, pp. 31-35.
|
3 |
P. Vinayakray-Jani, "Roadmap for Securing Handheld Devices," in IFIP International Information Security Conference, 2003, pp. 477-482.
|
4 |
H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi, "Probing attacks on integrated circuits: Challenges and research opportunities," IEEE Design & Test, vol. 34, pp. 63-71, 2017.
|
5 |
E. Biagioni, "Preventing UDP flooding amplification attacks with weak authentication," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 78-82.
|
6 |
D. Goel and A. K. Jain, "Mobile phishing attacks and defence mechanisms: State of art and open research challenges," Computers & Security, vol. 73, pp. 519-544, 2018.
DOI
|
7 |
J. Nie, P. Wang, and L. Lei, "Why can't we be separated from our smartphones? The vital roles of smartphone activity in smartphone separation anxiety," Computers in Human Behavior, vol. 109, p. 106351, 2020.
DOI
|
8 |
W. L. M. A. C. M. a. P. L. P. S. h. s. i. o. The Institute of Electrical and Electronics Engineers (IEEE), ANSI/IEEE Std.802.11, 1999. (a.k.a. ISO/IEC 8802-11:1999(E)).
|
9 |
A. Lima, L. Rosa, T. Cruz, and P. Simoes, "A Security Monitoring Framework for Mobile Devices," Electronics, vol. 9, p. 1197, 2020.
DOI
|
10 |
M. A. Harris and K. P. Patten, "Mobile device security considerations for small-and medium-sized enterprise business mobility," Information Management & Computer Security, 2014.
|
11 |
S. B. Utomo and B. Hendradjaya, "Multifactor authentication on mobile secure attendance system," in 2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5.
|
12 |
R. Hartman, C. Rokitta, and D. Peake, Oracle Application Express for Mobile Web Applications: Springer, 2013.
|
13 |
S. Furnell, "Securing mobile devices: technology and attitude," Network Security, vol. 2006, pp. 9-13, 2006.
DOI
|
14 |
M. A. Al-shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Review of prevention schemes for man-in-themiddle (MITM) attack in vehicular ad hoc networks," International Journal of Engineering and Management Research, vol. 10, 2020.
|
15 |
J. Srinivas, A. K. Das, and N. Kumar, "Government regulations in cyber security: Framework, standards and recommendations," Future Generation Computer Systems, vol. 92, pp. 178-188, 2019.
DOI
|
16 |
B. Halpert, "Mobile device security," in Proceedings of the 1st annual conference on Information security curriculum development, 2004, pp. 99-101.
|
17 |
S. M. Dye and K. Scarfone, "A standard for developing secure mobile applications," Computer Standards & Interfaces, vol. 36, pp. 524-530, 2014.
DOI
|
18 |
L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 319-330, 2018.
DOI
|