Today the smartphone is definitely the most popular and used device, surpassing by far the laptop. Unfortunately, its popularity makes it also the most targeted goal for malicious attacks. On the other hand mobile security is still in its infancy and improvements are needed to provide adequate protection to the users. This paper contributes with threat assessment model which enables a systematic analysis and evaluation of mobile malware. The same model can also be used to evaluate the effectiveness of security protection measures.
CITATION STYLE
v Do, T., Lyche, F. B., Lytskjold, J. H., & van Thuan, D. (2015). Threat assessment model for mobile malware. Lecture Notes in Electrical Engineering, 339, 467–474. https://doi.org/10.1007/978-3-662-46578-3_55
Mendeley helps you to discover research relevant for your work.