Cargando…
An Analysis of Security System for Intrusion in Smartphone Environment
There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notificati...
Autores principales: | , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Hindawi Publishing Corporation
2014
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4138763/ https://www.ncbi.nlm.nih.gov/pubmed/25165754 http://dx.doi.org/10.1155/2014/983901 |
_version_ | 1782331277036224512 |
---|---|
author | Louk, Maya Lim, Hyotaek Lee, HoonJae |
author_facet | Louk, Maya Lim, Hyotaek Lee, HoonJae |
author_sort | Louk, Maya |
collection | PubMed |
description | There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. |
format | Online Article Text |
id | pubmed-4138763 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2014 |
publisher | Hindawi Publishing Corporation |
record_format | MEDLINE/PubMed |
spelling | pubmed-41387632014-08-27 An Analysis of Security System for Intrusion in Smartphone Environment Louk, Maya Lim, Hyotaek Lee, HoonJae ScientificWorldJournal Research Article There are many malware applications in Smartphone. Smartphone's users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. Hindawi Publishing Corporation 2014 2014-08-05 /pmc/articles/PMC4138763/ /pubmed/25165754 http://dx.doi.org/10.1155/2014/983901 Text en Copyright © 2014 Maya Louk et al. https://creativecommons.org/licenses/by/3.0/ This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |
spellingShingle | Research Article Louk, Maya Lim, Hyotaek Lee, HoonJae An Analysis of Security System for Intrusion in Smartphone Environment |
title | An Analysis of Security System for Intrusion in Smartphone Environment |
title_full | An Analysis of Security System for Intrusion in Smartphone Environment |
title_fullStr | An Analysis of Security System for Intrusion in Smartphone Environment |
title_full_unstemmed | An Analysis of Security System for Intrusion in Smartphone Environment |
title_short | An Analysis of Security System for Intrusion in Smartphone Environment |
title_sort | analysis of security system for intrusion in smartphone environment |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4138763/ https://www.ncbi.nlm.nih.gov/pubmed/25165754 http://dx.doi.org/10.1155/2014/983901 |
work_keys_str_mv | AT loukmaya ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT limhyotaek ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT leehoonjae ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT loukmaya analysisofsecuritysystemforintrusioninsmartphoneenvironment AT limhyotaek analysisofsecuritysystemforintrusioninsmartphoneenvironment AT leehoonjae analysisofsecuritysystemforintrusioninsmartphoneenvironment |