Malicious Codes in Mobile Phones

Abstract

 In this paper a survey study is made on various issues of mobile malicious codes. Spreading pattern of different mobile viruses is discussed to make a collective analysis of concerned problem and various approaches are also discussed to solve those problems.

Authors and Affiliations

Ankur Singh Bist

Keywords

Related Articles

 REALIZATION OF THERMOELECTRIC GENERATOR USING A PELTIER CHIP

 This paper provides a thorough description of the experimental set up and the procedure that was conformed to in order to test the hypothesis of generating electricity from the temperature difference of an automot...

 COMPARISON OF MICROSTRUCTURE OF AL-CU ALLOYS CAST IN CALCITE INVESTMENT SHELL AND DRY SAND MOULDS

 The investment shell moulds were fabricated with ceramic slurry containing calcite as a filler material and colloidal silica binder. The shell characteristics in terms of hot bending strength, thermal expansion an...

 Optimal Placement of FACTS Devices in a Typical Power System

 This paper presents an approach for the optimal placement of FACTS devices. The devices considered are Static Var Compensator (SVC) and Thyristor Controller Series Capacitor (TCSC). Optimal location of TCSC is id...

Curriculum Design for Technical Institutions -An Expert System Approach

This paper presents the development of expert system to assist technical institutes, universities curriculum developers, experts to analysis the gap between competencies developed in student through existing curriculum...

 Critical Event Monitoring in WSNS using Level-By-Level Offset Based Wake up Pattern

 This paper proposed to monitor a critical event in wireless sensor networks. Whenever a critical event occurs, the critical event is detected by the nearby sensor nodes. Immediately these sensor nodes should broad...

Download PDF file
  • EP ID EP138112
  • DOI -
  • Views 64
  • Downloads 0

How To Cite

Ankur Singh Bist (30).  Malicious Codes in Mobile Phones. International Journal of Engineering Sciences & Research Technology, 2(12), 3472-3477. https://europub.co.uk/articles/-A-138112