Securing the mobile environment: firewall anti-leak of sensitive data on smartphone.
Najim AmmariAlmokhtar Ait El MrabtiAnas Abou El KalamAbdellah Ait OuahmanPublished in: ICC (2017)
Keyphrases
- mobile environments
- sensitive data
- information security
- mobile devices
- mobile applications
- network security
- intrusion detection
- unauthorized access
- privacy preserving
- mobile users
- private information
- smart card
- intrusion detection system
- mobile computing
- mobile phone
- sensitive information
- context aware
- data sharing
- location based services
- network traffic
- data storage
- privacy protection
- computing environments
- information systems
- third party
- user experience
- anomaly detection
- security threats
- computer networks
- communication networks
- data analysis
- e learning
- database