Component Security Ten Years Later: An Empirical Study of Cross-Layer Threats in Real-World Mobile Applications.
Keke LianLei ZhangGuangliang YangShuo MaoXinjie WangYuan ZhangMin YangPublished in: Proc. ACM Softw. Eng. (2024)
Keyphrases
- mobile applications
- cross layer
- information security
- security issues
- mobile devices
- mobile phone
- video streaming
- wireless networks
- user experience
- quality of service
- routing protocol
- multi layer
- smart phones
- mobile users
- m learning
- mobile ad hoc networks
- context aware
- application layer
- intrusion detection
- smart card
- mobile services
- mobile technologies
- end users
- cloud computing
- key management
- security policies
- life cycle
- network security
- scalable video
- multimedia services
- expert systems