A Study on modeling to predict security threat of smart phones

被引:0
|
作者
Kim, Jong Min [1 ]
Lee, Dong Hwi [1 ]
Kim, Kui Nam J. [2 ]
机构
[1] Kyonggi Univ, Dept Ind Secur, Chungjeongno 2 Ga, Seoul, South Korea
[2] Kyonggi Univ, Dept Convergence Secur, Suwon, Gyeonggi, South Korea
来源
2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA 2013) | 2013年
关键词
Smart phones; Markov Chain; Prediction of security threat;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The smart phone markets rapidly grow in the whole world as well as Korea and at the same time, security threat also tends to increase. These various studies on security threat of smart phones have been arranged but the studies on prediction models are insufficient. This paper tries to modeling to predict security threat of smart phones by using Markov Chain which is very much used in prediction studies.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Data Security and Threat Modeling for Smart City Infrastructure
    Wang, Paul
    Ali, Amjad
    Kelly, William
    2015 INTERNATIONAL CONFERENCE ON CYBER SECURITY OF SMART CITIES, INDUSTRIAL CONTROL AND COMMUNICATIONS (SSIC), 2015,
  • [2] Young People and Smart Phones: An Empirical Study on Information Security
    Barn, Balbir S.
    Barn, Ravinder
    Tan, Jo-Pei
    2014 47TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2014, : 4504 - 4514
  • [3] Security Threats of Smart Phones and Bluetooth
    Loo, Alfred
    COMMUNICATIONS OF THE ACM, 2009, 52 (03) : 150 - 152
  • [4] A Study of Security Threat for Internet of Things in Smart Factory
    Chai, Tze Uei
    Goh, Hock Guan
    Ponnusamy, Vasaki
    2021 IEEE INTERNATIONAL CONFERENCE ON COMPUTING (ICOCO), 2021, : 97 - 102
  • [5] Tool-assisted Threat Modeling for Smart Grid Cyber Security
    Fla, Lars Halvdan
    Borgaonkar, Ravishankar
    Tondel, Inger Anne
    Jaatun, Martin Gilje
    2021 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA 2021), 2021,
  • [6] Security camera design using smart phones
    Ramadhan, Y.
    Hartono, R.
    Hermawan, Y. A.
    4TH ANNUAL APPLIED SCIENCE AND ENGINEERING CONFERENCE, 2019, 2019, 1402
  • [7] A descriptive study of assumptions in STRIDE security threat modeling
    Van Landuyt, Dimitri
    Joosen, Wouter
    SOFTWARE AND SYSTEMS MODELING, 2022, 21 (06): : 2311 - 2328
  • [8] A descriptive study of assumptions in STRIDE security threat modeling
    Dimitri Van Landuyt
    Wouter Joosen
    Software and Systems Modeling, 2022, 21 (6): : 2311 - 2328
  • [9] Towards Enhancing the Security of OAuth Implementations In Smart Phones
    Shehab, Mohammed
    Mohsen, Fadi
    2014 IEEE INTERNATIONAL CONFERENCE ON MOBILE SERVICES (MS), 2014, : 39 - 46
  • [10] SMART CITIES SECURITY THREAT LANDSCAPE: A REVIEW
    Anwar, Raja Waseem
    Ali, Saqib
    COMPUTING AND INFORMATICS, 2022, 41 (02) : 405 - 423