Safe use of mobile devices arises from knowing the threats.
Blaz MarkeljIgor BernikPublished in: J. Inf. Secur. Appl. (2015)
Keyphrases
- mobile devices
- mobile learning
- mobile phone
- context aware
- mobile users
- smart phones
- learning activities
- embedded devices
- countermeasures
- mobile environments
- mobile applications
- mobile technologies
- information security
- tablet computers
- location aware
- mobile services
- mobile computing
- computer security
- cyber security
- security services
- computing devices
- hardware platforms
- location based services
- information systems
- desktop computers
- m learning
- security threats
- denial of service attacks
- malicious attacks
- buffer overflow