Keyphrases
- buffer overflow
- mobile phone
- mobile devices
- security vulnerabilities
- mobile learning
- mobile environments
- malicious attacks
- security risks
- mobile networks
- information security
- mobile computing
- mobile users
- countermeasures
- communication technologies
- computer security
- mobile commerce
- mobile applications
- smart phones
- web applications
- location aware
- cyber security
- mobile terminals
- cyber attacks
- computing environments
- neural network