Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 983901, 12 pages
http://dx.doi.org/10.1155/2014/983901
Research Article

An Analysis of Security System for Intrusion in Smartphone Environment

1Department of Ubiquitous IT, Graduate School of Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea
2Division of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of Korea

Received 14 March 2014; Accepted 4 June 2014; Published 5 August 2014

Academic Editor: Fei Yu

Copyright © 2014 Maya Louk et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [4 citations]

The following is the list of published articles that have cited the current article.

  • Mojtaba Alizadeh, Saeid Abolfazli, Mazdak Zamani, Sabariah Baharun, and Kouichi Sakurai, “Authentication in mobile cloud computing: A survey,” Journal of Network and Computer Applications, 2015. View at Publisher · View at Google Scholar
  • Dongwoo Kim, Jin Kwak, and Jaecheol Ryou, “DWroidDump: Executable Code Extraction from Android Applications for Malware Analysis,” International Journal of Distributed Sensor Networks, vol. 2015, pp. 1–9, 2015. View at Publisher · View at Google Scholar
  • Lansheng Han, Songsong Liu, Shuxia Han, Wenjing Jia, and Jingwei Lei, “Owner based malware discrimination,” Future Generation Computer Systems, 2016. View at Publisher · View at Google Scholar
  • Luca Casati, and Andrea Visconti, “The Dangers of Rooting: Data Leakage Detection in Android Applications,” Mobile Information Systems, vol. 2018, pp. 1–9, 2018. View at Publisher · View at Google Scholar