参考文献
|
-
Tse, D. W. K.(2014).A New Smartphone Privacy Protection Scheme based on Anti-theft Technology.Computer Audit Association,30
連結:
-
Microsoft TechNet Library, “MDM System Overview,” http://technet.microsoft.com/en-us/library/cc135589(TechNet.10).aspx, October 2008.
-
IThome ,「TLS 加密協定竟然也不安全! 企業須審慎內部漏洞」,http://www.ithome.com.tw/promotion/93094,民國103 年
-
K. Hess, “How to Evaluate Mobile Management Solutions,” Tom's IT PRO, http://www.tomsitpro.com/articles/evaluating-mobile-management-solutions,2-708-2.html, March 2014.
-
P. Wagenseil, “Half of Used Cellphones Still Hold Personal Data,” NBC News, 2011.
-
EC-Council, “Module 15. Hacking Mobile Platforms,” Ethical Hacking and Countermeasures, Certified Ethical Hacker version 9 (CEHv9) Exam 312-50, 2016..
-
Adibi, S.(2014).Comparative Mobile Platforms Security Solutions.2014 IEEE 27th Canadian Conference of Electrical and Computer Engineering (CCECE)
-
Chang, J. M.,Ho, P. C.,Chang, T. C.(2014).Securing BYOD.IEEE IT Professional,16(5),9-11.
-
Cloud Security Alliance=CSA(2009).Security Guidance for Critical Areas of Focus in Cloud Computing V2.1.
-
Ding, J. H.,Chien, R.,Hung, S. H.,Lin, Y. L.,Kuo, C. Y.,Hsu, C. H.,Chung, Y. C.(2014).A Framework of Cloud-based Virtual Phones for Secure Intelligent Information Management.International Journal of Information Management,34(3),329-335.
-
Eslahi, M.,Naseri, M. V.,Hashim, H.,Tahir, N. M.,Saad, E. H. M.(2014).BYOD: Current State and Security Challenges.IEEE Symposium on Computer Applications & Industrial Electronics (ISCAIE)
-
Han, D.,Zhang, C.,Fan, X.,Hindle, A.,Wong, K.,Stroulia, E.(2012).Understanding Android Fragmentation with Topic Analysis of Vendor-Specific Bugs.2012 19th IEEE Working Conference on Reverse Engineering (WCRE)
-
John, M.(1991).Information Systems Security: A Comprehensive Model.Proceedings of the 14th National Computer Security Conference
-
Juniper Networks Mobile Threat Center=MTC(2013).Juniper Networks Third Annual Mobile Threats Report: March 2012 through March 2013.
-
Juniper Networks Mobile Threat Center=MTC(2012).2011 Mobile Threats Report.
-
Kim, K. J.,Hong, S. P.(2014).Study on Enhancing Vulnerability Evaluations for BYOD Security.International Journal of Security and Its Applications,8(4),229-238.
-
Miller, K. W.,Voas, J.,Hurlburt, G. F.(2012).BYOD: Security and Privacy Considerations.IT Professional,14(5),53-55.
-
Morrow, B.(2012).BYOD Security Challenges: Control and Protect your Most Sensitive Data.Network Security,2012(12),5-8.
-
Park, W. H.,Kim, D. H.,Kim, M. S.,Park, N.(2013).A Study on Trend and Detection Technology for Cyber Threats in Mobile Environment.2013 International Conference on IT Convergence and Security (ICITCS)
-
Pilz, H.,Schindler, S.(2011).AV-TEST ReportAV-TEST Report,未出版
-
Romer, H.(2014).Best Practices for BYOD Security.Computer Fraud & Security,2014(1),13-15.
-
Samaras, V.,Daskapan, S.,Ahmad, R.,Ray, S. K.(2015).An Enterprise Security Architecture for Accessing SaaS Cloud Services with BYOD.Australasian Telecommunication Networks and Applications Conference
-
Scarfo, A.(2012).New Security Perspectives around BYOD.Proceedings of the 2012 7th International Conference on Broadband, Wireless Computing, Communication and Applications
-
Symantec(2012).2011 Internet Security Threat Report.
-
Titze, D.,Stephanow, P.,Schutte, J.(2013).A Configurable and Extensible Security Service Architecture for Smartphones.2013 27th International Conference on Advanced Information Networking and Applications Workshops (WAINA)
-
Wang, Y.,Wei, J.,Vangury, K.(2014).Bring Your Own Device Security issues and challenges.2014 IEEE 11th Consumer Communications and Networking Conference (CCNC)
-
Zhou, Y.,Jiang, X.(2012).Dissecting Android Malware: Characterization and Evolution.2012 IEEE Symposium on Security and Privacy (SP2012)
|