Mobile Security for the modern CEO: Attacks, Mitigations, and Future Trends.
Marc SchmittPublished in: CoRR (2022)
Keyphrases
- future trends
- mobile communications
- security threats
- security problems
- security mechanisms
- computer security
- open issues
- security protocols
- security measures
- cyber attacks
- java card
- security vulnerabilities
- information security
- countermeasures
- security breaches
- security issues
- security flaws
- stream cipher
- denial of service attacks
- chosen plaintext
- security risks
- malicious attacks
- malicious users
- data mining
- mobile payment
- mobile commerce
- mobile devices
- fault injection
- intrusion detection and prevention
- intrusion detection
- cryptographic protocols
- security requirements
- security policies
- smart card
- mobile networks
- sensitive data
- mobile applications
- network security
- access control
- biometric template
- information leakage
- defense mechanisms
- cyber security
- watermarking scheme
- dos attacks
- computing environments
- anomaly detection
- context aware
- block cipher
- attack scenarios
- mobile computing
- secure routing
- key management
- security analysis
- ad hoc networking
- data sets