Security Methods Against Potential Physical Attacks on Smartphones
暂无分享,去创建一个
[1] Neng Gao,et al. Remotely wiping sensitive data on stolen smartphones , 2014, AsiaCCS.
[2] Sebastian Möller,et al. Psychological needs as motivators for security and privacy actions on smartphones , 2017, J. Inf. Secur. Appl..
[3] Graham Farrell. Preventing phone theft and robbery: the need for government action and international coordination , 2015 .
[4] Ni Zhang,et al. A Survey on Smartphone Security , 2013 .
[5] Abhishek Tiwari,et al. ThiefTrap - An Anti-theft Framework for Android , 2017, SecureComm.
[6] Xin Meng,et al. iGuard: A Real-Time Anti-Theft System for Smartphones , 2018, IEEE Transactions on Mobile Computing.
[7] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[8] Jie Wu,et al. SafeCode - Safeguarding Security and Privacy of User Data on Stolen iOS Devices , 2012, CSS.
[9] Serge Egelman,et al. Detecting Phone Theft Using Machine Learning , 2018 .
[10] Wendy Middlemiss,et al. Impact of parents mobile device use on parent-child interaction: A literature review , 2017, Comput. Hum. Behav..
[11] Janina da Costa Cruz,et al. Chaining Property to Blocks - On the Economic Efficiency of Blockchain-Based Property Enforcement , 2018, BIS.
[12] Shan Chang,et al. SmartDog: Real-Time Detection of Smartphone Theft , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[13] Tuomas Aura,et al. Unblocking Stolen Mobile Devices Using SS7-MAP Vulnerabilities: Exploiting the Relationship between IMEI and IMSI for EIR Access , 2015, 2015 IEEE Trustcom/BigDataSE/ISPA.
[14] V. Joseph Raymond,et al. Google drive based secured anti-theft android application , 2017, 2017 International Conference on IoT and Application (ICIOT).
[15] Prabhpreet Kaur,et al. Vulnerability Detection of International Mobile Equipment Identity Number of Smartphone and Automated Reporting of Changed IMEI Number , 2015 .
[16] Gerald Q. Maguire,et al. An Architecture To Provide Cloud Based Security Services For Smartphones , 2011 .
[17] Laurent Simon,et al. Security Analysis of Consumer-Grade Anti-Theft Solutions Provided by Android Mobile Anti-Virus , 2015 .