Strategies in Improving Android Security.
Daniel TseX. LiuChristopher NusaputraB. HuWang YM. W. XingPublished in: PACIS (2014)
Keyphrases
- malware detection
- information security
- information assurance
- security issues
- intrusion detection
- security policies
- security requirements
- functional requirements
- security mechanisms
- security systems
- network security
- security threats
- mobile devices
- optimal strategy
- mobile applications
- key management
- computer security
- security protocols