Security attacks taxonomy on bring your own devices (BYOD) model
Mobile devices, specifically smartphones, have become ubiquitous. For this reason, businesses are starting to develop “Bring Your Own Device” policies to allow their employees to use their owned devices in the workplace. BYOD offers many potential advantages: enhanced productivity, increased revenue...
Main Authors: | Singh, Manmeet Mahinderjit, Soh, Sin Siang, Oh, Ying San, Malim, Nurul Hashimah Ahamed Hassain, Shariff, Azizul Rahman Mohd |
---|---|
Format: | Article |
Language: | English |
Published: |
Wireilla
2014
|
Subjects: | |
Online Access: | http://eprints.usm.my/47317/1/SECURITY_ATTACKS_TAXONOMY_ON_BRING_YOUR.pdf |
Similar Items
-
Extraction Of Defensin Antimicrobial Peptide From SWISS-PROT Database Using Extended Boyer-More Algorithm.
by: Ahamed Hassain Malim, N.H., et al.
Published: (2007) -
Application Of Exact String Matching Algorithms Towards SMILES Representation Of Chemical Structure.
by: Klaib, Ahmad Fadel, et al.
Published: (2007) -
iProt – A Data Warehouse For Protein Database.
by: Jaya, M.I., et al.
Published: (2007) -
Adapting Artificial Immune Algorithms For University Timetabling
by: Malim , Muhammad Rozi
Published: (2009) -
Social media sentiment analysis and opinion mining in public security: Taxonomy, trend analysis, issues and future directions
by: Mohd Suhairi Md Suhaimin, et al.
Published: (2023)