메뉴 건너뛰기




Volumn , Issue , 2007, Pages 19-26

A malware signature extraction and detection method applied to mobile networks

Author keywords

[No Author keywords available]

Indexed keywords

MALWARE DETECTION; MOBILE PHONE NETWORKS; SIGNATURE EXTRACTION; SYMBIAN VIRUSES;

EID: 36349005250     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/PCCC.2007.358875     Document Type: Conference Paper
Times cited : (15)

References (15)
  • 4
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • D. Dagon, T. Martin, and T. Starner, "Mobile phones as computing devices: the viruses are coming!," Pervasive Computing, IEEE, Vol. 3, pp. 11-15, 2004.
    • (2004) Pervasive Computing, IEEE , vol.3 , pp. 11-15
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 5
    • 0032108328 scopus 로고    scopus 로고
    • A threshold of Inn for approximating set cover
    • U. Feige, " A threshold of Inn for approximating set cover," Journal of the ACM, Vol. 45, pp. 634-652, 1998.
    • (1998) Journal of the ACM , vol.45 , pp. 634-652
    • Feige, U.1
  • 6
    • 0003552088 scopus 로고
    • Automatic extraction of computer virus signatures
    • Abingdon: UK, Virus Bulletin Ltd, pp
    • J.O. Kephart and W.C. Arnold, "Automatic extraction of computer virus signatures," in Virus Bulletin International Conference, Abingdon: UK, Virus Bulletin Ltd., pp. 178-184, 1994.
    • (1994) Virus Bulletin International Conference , pp. 178-184
    • Kephart, J.O.1    Arnold, W.C.2
  • 7
    • 85084163246 scopus 로고    scopus 로고
    • Autograph: Toward automated, distributed worm signature detection
    • H.-A. Kim and B. Karp, "Autograph: toward automated, distributed worm signature detection," in USENIX Security Symposium, 2004.
    • (2004) USENIX Security Symposium
    • Kim, H.-A.1    Karp, B.2
  • 15
    • 0030216542 scopus 로고    scopus 로고
    • Neural networks for computer virus recognition
    • G. Tesauro, J.O. Kephart, and G.B. Sorken, "Neural networks for computer virus recognition," IEEE Expert, Vol. 11, pp. 5-6, 1996.
    • (1996) IEEE Expert , vol.11 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorken, G.B.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.