References
- J. Nie, P. Wang, and L. Lei, "Why can't we be separated from our smartphones? The vital roles of smartphone activity in smartphone separation anxiety," Computers in Human Behavior, vol. 109, p. 106351, 2020. https://doi.org/10.1016/j.chb.2020.106351
- S. B. Utomo and B. Hendradjaya, "Multifactor authentication on mobile secure attendance system," in 2018 International Conference on ICT for Smart Society (ICISS), 2018, pp. 1-5.
- G. Kim, Y. Jeon, and J. Kim, "Secure mobile device management based on domain separation," in 2016 International Conference on Information and Communication Technology Convergence (ICTC), 2016, pp. 918-920.
- S. S. Manvi, L. B. Bhajantri, and M. Vijayakumar, "Secure mobile payment system in wireless environment," in 2009 International Conference on Future Computer and Communication, 2009, pp. 31-35.
- S. Furnell, "Securing mobile devices: technology and attitude," Network Security, vol. 2006, pp. 9-13, 2006. https://doi.org/10.1016/S1353-4858(06)70431-7
- A. Lima, L. Rosa, T. Cruz, and P. Simoes, "A Security Monitoring Framework for Mobile Devices," Electronics, vol. 9, p. 1197, 2020. https://doi.org/10.3390/electronics9081197
- P. Vinayakray-Jani, "Roadmap for Securing Handheld Devices," in IFIP International Information Security Conference, 2003, pp. 477-482.
- M. A. Al-shareeda, M. Anbar, S. Manickam, and I. H. Hasbullah, "Review of prevention schemes for man-in-themiddle (MITM) attack in vehicular ad hoc networks," International Journal of Engineering and Management Research, vol. 10, 2020.
- H. Wang, D. Forte, M. M. Tehranipoor, and Q. Shi, "Probing attacks on integrated circuits: Challenges and research opportunities," IEEE Design & Test, vol. 34, pp. 63-71, 2017.
- E. Biagioni, "Preventing UDP flooding amplification attacks with weak authentication," in 2019 International Conference on Computing, Networking and Communications (ICNC), 2019, pp. 78-82.
- D. Goel and A. K. Jain, "Mobile phishing attacks and defence mechanisms: State of art and open research challenges," Computers & Security, vol. 73, pp. 519-544, 2018. https://doi.org/10.1016/j.cose.2017.12.006
- J. Srinivas, A. K. Das, and N. Kumar, "Government regulations in cyber security: Framework, standards and recommendations," Future Generation Computer Systems, vol. 92, pp. 178-188, 2019. https://doi.org/10.1016/j.future.2018.09.063
- R. Hartman, C. Rokitta, and D. Peake, Oracle Application Express for Mobile Web Applications: Springer, 2013.
- B. Halpert, "Mobile device security," in Proceedings of the 1st annual conference on Information security curriculum development, 2004, pp. 99-101.
- M. A. Harris and K. P. Patten, "Mobile device security considerations for small-and medium-sized enterprise business mobility," Information Management & Computer Security, 2014.
- S. M. Dye and K. Scarfone, "A standard for developing secure mobile applications," Computer Standards & Interfaces, vol. 36, pp. 524-530, 2014. https://doi.org/10.1016/j.csi.2013.09.005
- L. Wu, J. Wang, K.-K. R. Choo, and D. He, "Secure key agreement and key protection for mobile device user authentication," IEEE Transactions on Information Forensics and Security, vol. 14, pp. 319-330, 2018. https://doi.org/10.1109/tifs.2018.2850299
- W. L. M. A. C. M. a. P. L. P. S. h. s. i. o. The Institute of Electrical and Electronics Engineers (IEEE), ANSI/IEEE Std.802.11, 1999. (a.k.a. ISO/IEC 8802-11:1999(E)).