Trojan horses in mobile devices.
Daniel FuentesJuan Antonio ÁlvarezJuan Antonio OrtegaLuis González AbrilFrancisco Velasco MorentePublished in: Comput. Sci. Inf. Syst. (2010)
Keyphrases
- mobile devices
- terrorist activities
- mobile phone
- context aware
- mobile learning
- mobile applications
- computing devices
- mobile computing
- wifi
- mobile environments
- smart phones
- learning activities
- m learning
- mobile technologies
- tablet computers
- mobile users
- communication technologies
- website
- previously unknown
- location aware
- embedded devices
- data sets
- ubiquitous computing
- language learning
- mobile services
- handheld devices
- mobile commerce
- metadata
- e learning
- hardware platforms