Journals
Publish with us
Publishing partnerships
About us
Blog
Mobile Information Systems
Journal overview
For authors
For reviewers
For editors
Table of Contents
Special Issues
Mobile Information Systems
/
2015
/
Article
/
Fig 2
/
Research Article
Messaging Attacks on Android: Vulnerabilities and Intrusion Detection
Figure 2
Output from main buffer showing logs of the receipt and suppression of SMS.