作者: A. Shabtai , Y. Fledel , U. Kanonov , Y. Elovici , S. Dolev
DOI: 10.1109/MSP.2010.2
关键词:
摘要: … and prioritize the threats to which an Android device might be exposed. We based our evaluation on assessing the impact and likelihood of various threats (see the sidebar on p. 43 …