Research Article

Messaging Attacks on Android: Vulnerabilities and Intrusion Detection

Figure 3

Output from radio buffer showing logs of the sending and receiving of SMS.