An Analysis of Security System for Intrusion in Smartphone Environment
There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (M...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2014-01-01
|
Series: | The Scientific World Journal |
Online Access: | http://dx.doi.org/10.1155/2014/983901 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832551231818563584 |
---|---|
author | Maya Louk Hyotaek Lim HoonJae Lee |
author_facet | Maya Louk Hyotaek Lim HoonJae Lee |
author_sort | Maya Louk |
collection | DOAJ |
description | There are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user. |
format | Article |
id | doaj-art-0cbfc84b5a8c400094968bf4472932be |
institution | Kabale University |
issn | 2356-6140 1537-744X |
language | English |
publishDate | 2014-01-01 |
publisher | Wiley |
record_format | Article |
series | The Scientific World Journal |
spelling | doaj-art-0cbfc84b5a8c400094968bf4472932be2025-02-03T06:01:50ZengWileyThe Scientific World Journal2356-61401537-744X2014-01-01201410.1155/2014/983901983901An Analysis of Security System for Intrusion in Smartphone EnvironmentMaya Louk0Hyotaek Lim1HoonJae Lee2Department of Ubiquitous IT, Graduate School of Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaDivision of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaDivision of Computer and Engineering Dongseo University, Sasang-Gu, Busan 617-716, Republic of KoreaThere are many malware applications in Smartphone. Smartphone’s users may become unaware if their data has been recorded and stolen by intruders via malware. Smartphone—whether for business or personal use—may not be protected from malwares. Thus, monitoring, detecting, tracking, and notification (MDTN) have become the main purpose of the writing of this paper. MDTN is meant to enable Smartphone to prevent and reduce the number of cybercrimes. The methods are shown to be effective in protecting Smartphone and isolating malware and sending warning in the form of notification to the user about the danger in progress. In particular, (a) MDTN process is possible and will be enabled for Smartphone environment. (b) The methods are shown to be an advanced security for private sensitive data of the Smartphone user.http://dx.doi.org/10.1155/2014/983901 |
spellingShingle | Maya Louk Hyotaek Lim HoonJae Lee An Analysis of Security System for Intrusion in Smartphone Environment The Scientific World Journal |
title | An Analysis of Security System for Intrusion in Smartphone Environment |
title_full | An Analysis of Security System for Intrusion in Smartphone Environment |
title_fullStr | An Analysis of Security System for Intrusion in Smartphone Environment |
title_full_unstemmed | An Analysis of Security System for Intrusion in Smartphone Environment |
title_short | An Analysis of Security System for Intrusion in Smartphone Environment |
title_sort | analysis of security system for intrusion in smartphone environment |
url | http://dx.doi.org/10.1155/2014/983901 |
work_keys_str_mv | AT mayalouk ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT hyotaeklim ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT hoonjaelee ananalysisofsecuritysystemforintrusioninsmartphoneenvironment AT mayalouk analysisofsecuritysystemforintrusioninsmartphoneenvironment AT hyotaeklim analysisofsecuritysystemforintrusioninsmartphoneenvironment AT hoonjaelee analysisofsecuritysystemforintrusioninsmartphoneenvironment |