Are Apple's security measures sufficient to protect its mobile devices?
Galen A. GrimesPublished in: WTS (2012)
Keyphrases
- security measures
- mobile devices
- countermeasures
- security management
- mobile phone
- security mechanisms
- security policies
- context aware
- mobile learning
- computer security
- security threats
- intrusion detection system
- mobile users
- smart phones
- mobile computing
- wifi
- mobile applications
- resource constraints
- intrusion detection
- mobile services
- communication technologies
- access control
- distributed systems