Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 234,977,163 papers from all fields of science
Search
Sign In
Create Free Account
Mobile security
Known as:
Mobile phone security
, Mobile Security Strategies
, Smartphone security
Expand
Mobile security or mobile phone security has become increasingly important in mobile computing. Of particular concern is the security of personal and…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
50 relations
Android
Biometrics
Block cipher
Bring your own device
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Android Malware of Static Analysis Technology Based on Data Mining
Chen Peng
,
Rongcai Zhao
,
Shan Zheng
,
J. Xun
,
Lijing Yan
2017
Corpus ID: 55697478
With the proliferation of malicious Android applications, an Android malicious code detection system is proposed in this paper…
Expand
2015
2015
A New Covert Channel over Cellular Voice Channel in Smartphones
Bushra Aloraini
,
Daryl Johnson
,
B. Stackpole
,
S. Mishra
arXiv.org
2015
Corpus ID: 9467788
Investigating network covert channels in smartphones has become increasingly important as smartphones have recently replaced the…
Expand
2014
2014
Mobile Security Solution for Enterprise Network
A. Kravets
,
N. D. Bui
,
Mohammed Al-Ashval
Joint Conference on Knowledge-Based Software…
2014
Corpus ID: 60410824
This paper discusses an approach to Mobile security solution for enterprise network. It describes a secure solution for protect…
Expand
2013
2013
An Android dynamic data protection model based on light virtualization
Qingqing Sun
,
Tao Qi
,
Tan Yang
,
Yidong Cui
15th IEEE International Conference on…
2013
Corpus ID: 952900
Today's smartphones are not only tools for entertainment and communication, but also very effective tools for increasing the…
Expand
2013
2013
Today's Mobile Security Requires a New Approach
N. Leavitt
Computer
2013
Corpus ID: 19050592
Companies are looking for new ways to secure their data and networks now that many employees are using their own mobile devices…
Expand
2013
2013
A Result Fusion based Distributed Anomaly Detection System for Android Smartphones
Zhizhong Wu
,
Xuehai Zhou
,
Junsai Xu
J. Networks
2013
Corpus ID: 351034
In this paper we present an information fusion based distributed anomaly detection system for Android mobile phones. The proposed…
Expand
2011
2011
Mobile Commerce and Related Mobile Security Issues
R. Yazdanifard
,
Mohamed Sayed
,
Abdelgadir Elkhabir
2011
Corpus ID: 1952420
This article will discuss how m-commerce conducts transactions of the mobile device through Internet and how these technologies…
Expand
2010
2010
Why Mobile Security is not Like Traditional Security
M. Jakobsson
2010
Corpus ID: 17026168
We argue that traditional security solutions do not necessarily work for mobile environments, but that suitable solutions can and…
Expand
2010
2010
An Enhanced Security Policy Framework for Android
Yi Jae Park
,
Doyoung Chung
,
Jangseong Kim
,
Kwangjo Kim
2010
Corpus ID: 19621756
Googles Android, a smartphone operating system, is used by many users, and the number of its users is increasing. However…
Expand
2004
2004
A Human-Like Semi Autonomous Mobile Security Robot
D. Carnegie
,
A. Prakash
,
Chris Chitty
,
B. Guy
2004
Corpus ID: 5151908
The Mechatronics Group of the University of Waikato have developed a fleet of five mobile robots capable of autonomous operation…
Expand