Please use this identifier to cite or link to this item:
http://www.ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8356Full metadata record
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Khurana, P. | - |
| dc.contributor.author | Sharma, Sharma | - |
| dc.contributor.author | Singh, Pradeep Kumar | - |
| dc.date.accessioned | 2022-11-25T09:49:10Z | - |
| dc.date.available | 2022-11-25T09:49:10Z | - |
| dc.date.issued | 2016 | - |
| dc.identifier.uri | http://ir.juit.ac.in:8080/jspui/jspui/handle/123456789/8356 | - |
| dc.language.iso | en | en_US |
| dc.publisher | Jaypee University of Information Technology, Solan, H.P. | en_US |
| dc.subject | Ad-hoc networks | en_US |
| dc.subject | Authentication | en_US |
| dc.subject | Malware | en_US |
| dc.subject | Vulnerabilities | en_US |
| dc.title | A Systematic Analysis on Mobile Application Software Vulnerabilities: Issues and Challenges | en_US |
| dc.type | Article | en_US |
| Appears in Collections: | Journal Articles | |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| A Systematic Analysis on Mobile Application Software Vulnerabilities Issues and Challenges.pdf | 183.55 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.