Downloads provided by UsageCounts
Mobile gadgets has became an integral part of daily lives. In comparison to desktop computers, mobile devices have grown exponentially in recent years. As mobile devices become more common, attackers have more opportunities to steal sensitive data or carry out various forms of assaults on them. We investigated many sorts of security concerns associated with mobile devices and mobile applications. In this research paper, various defensive measures for preventing these security threats in mobile devices were discussed.
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
| views | 2 | |
| downloads | 5 |

Views provided by UsageCounts
Downloads provided by UsageCounts