Mobile devices vulnerabilities

2Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

With the increase in popularity of mobile devices for personal and business reasons, they have become even more attractive targets to malicious actors. There are many vulnerabilities with any mobile device, though some environments, features, and operating systems are at higher risk than others for certain attacks. This paper discusses such vulnerabilities, including the elements that allow them, methods of exploiting them, and one might combat attacks on mobile devices.

Cite

CITATION STYLE

APA

Schneider, M. M., Chowdhury, M., & Latif, S. (2022). Mobile devices vulnerabilities. In EPiC Series in Computing (Vol. 82, pp. 92–101). EasyChair. https://doi.org/10.29007/kg5j

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free