Threat assessment model for mobile malware

2Citations
Citations of this article
17Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Today the smartphone is definitely the most popular and used device, surpassing by far the laptop. Unfortunately, its popularity makes it also the most targeted goal for malicious attacks. On the other hand mobile security is still in its infancy and improvements are needed to provide adequate protection to the users. This paper contributes with threat assessment model which enables a systematic analysis and evaluation of mobile malware. The same model can also be used to evaluate the effectiveness of security protection measures.

Cite

CITATION STYLE

APA

v Do, T., Lyche, F. B., Lytskjold, J. H., & van Thuan, D. (2015). Threat assessment model for mobile malware. Lecture Notes in Electrical Engineering, 339, 467–474. https://doi.org/10.1007/978-3-662-46578-3_55

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free