À propos de cet article

Citez

[1] Eric Filiol, Paul Irolla - (In)Security of Mobile Banking and of Other Mobile Apps, White Paper, Black Hat Asia 2015.Search in Google Scholar

[2] Robert Lipovsky, Lukas Stefanko, Gabriel Branisa, Trends in Android Ransomware, Whitepaper, ESET, 2017 https://www.welivesecurity.com/wp-content/uploads/2017/02/ESET_Trends_2017_in_Android_Ransomware.pdf.Search in Google Scholar

[3] Mobile Threat Landscape Report, Pradeo, 2018 -https://www.pradeo.com/media/mobile_threat_landscape_S12018.pdf.10.1016/S1361-3723(18)30050-2Search in Google Scholar

[4] Avast Threat Landscape Report: 2018 Predictions, Avast, 2018 -https://press.avast.com/hubfs/media-materials/kits/Avast-Threat-Landscape-Report-2018-Predictions/Avast-Threat-Landscape%20Report-2018%20Predictions.pdf?t=1517564995066.Search in Google Scholar

[5] Sachin Sharma, The Mobile Threats Lurking In Our Applications, VMware EUC Blog, March, 2018.Search in Google Scholar

[6] Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2017–2022 White Paper - https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-738429.html.Search in Google Scholar

[7] Ponemon Institute – The State of Mobile Application Insecurity, 2017.Search in Google Scholar