... Smart Grid Coordination Group. (2014). SGCG/M490/G Smart Grid Set of ... vulnerabilities of consumer internet of things (IoT) devices: a scalable ... Exploiting battery-drain vulnerabilities in mobile smart devices. IEEE Transactions on ...
... Exploiting battery - drain vulnerabilities in mobile smart devices . IEEE Transactions on Sustainable Computing 2 ( 2 ) : 90–99 . Frustaci , M. , Pace , P. , Aloi , G. , and Fortino , G. ( 2018 ) . Evaluating critical security issues of ...
... devices are constantly connected to the internet and frequently used to ... drain the battery thereby reducing the system availability. BACKGROUND Based on the research, the chapter shows ... Threats and Vulnerabilities of Mobile Applications.
... connected to the internet and frequently used to access web-based services, web-based threats will cause ... drain the battery thereby reducing the system availability. DOI: 10.4018/978 ... Threats and Vulnerabilities of Mobile Applications.
... mobile devices from mainstream vendors like Norton and Symantec. These tools ... battery drain. Malicious apps may root your device or drain your battery ... exploit your devices, if they are vulnerable. Protecting Your Smartphone and ...
... drain away the phone's battery. Beyond the threat of mobile malware, cybercriminals are involved in other exploits of mobile devices in general. The number of vulnerabilities witnessed in smartphone is being increased. Synchronization ...
... hacking [22] – Remote SIM hacking Unveiling the hidden dangers of public IP addresses in 4G/LTE cellular data networks [23] – Data Quota Drain – Battery Drain Gaining control of cellular traffic accounting by spurious TCP retransmission ...
... vulnerabilities to exploit. The proliferation of mobile devices, particularly smartphones, has accelerated the ongoing revolution in social communication and increased the need for scalable computing resources. However, the limited battery ...
... devices. S. No. Name Description 1. SMSZombie Hidden inside the application ... Battery Charger This application was supposed to extend the battery life of a mobile smartphone when installed, but actually used ... mobile vulnerabilities. S.