Works matching DE "MOBILE communication system security"


Results: 80
    1
    2

    Vetting Mobile Apps.

    Published in:
    IT Professional, 2011, v. 13, n. 4, p. 9, doi. 10.1109/MITP.2011.73
    By:
    • Quirolgico, Steve;
    • Voas, Jeffrey;
    • Kuhn, Rick
    Publication type:
    Article
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    18

    From the PRESIDENT.

    Published in:
    Georgia Library Quarterly, 2011, v. 48, n. 4, p. 3, doi. 10.62915/2157-0396.1567
    Publication type:
    Article
    19
    20

    Secure mobile device structure for trust IoT.

    Published in:
    Journal of Supercomputing, 2018, v. 74, n. 12, p. 6646, doi. 10.1007/s11227-017-2155-y
    By:
    • Yoon, Hyunsoo;
    • Lee, Yun-kyung;
    • Kim, Jeong-nyeo;
    • Lim, Kyung-Soo
    Publication type:
    Article
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30
    31
    32
    33
    34
    35
    36
    37
    38

    Securing VoIP in SIP Mobile Network.

    Published in:
    World of Computer Science & Information Technology Journal, 2015, v. 5, n. 1, p. 6
    By:
    • Zaid Salah Munef;
    • Al-Hamami, Alaa Hussein
    Publication type:
    Article
    39

    Mobile Application Threats and Security.

    Published in:
    World of Computer Science & Information Technology Journal, 2014, v. 4, n. 5, p. 57
    By:
    • Mirzoev, Timur;
    • Brannon, Michael;
    • Lasker, Shamimara;
    • Miller, Mark
    Publication type:
    Article
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50