메뉴 건너뛰기




Volumn , Issue , 2008, Pages 154-160

Efficient anomaly detection system for mobile handsets

Author keywords

[No Author keywords available]

Indexed keywords

ANOMALOUS BEHAVIORS; ANOMALY DETECTION SYSTEMS; ARM ARCHITECTURES; COMPUTATIONAL RESOURCES; HIGH ACCURACIES; LOW OVERHEADS; MOBILE HANDSETS; NORMAL BEHAVIORS; SOFTWARE BEHAVIORS;

EID: 55849149078     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SECURWARE.2008.16     Document Type: Conference Paper
Times cited : (3)

References (7)
  • 4
    • 55849137540 scopus 로고    scopus 로고
    • A practical mimicry attack against powerful system-call monitors
    • Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University
    • C. Parampalli, R. Sekar, and R. Johnson, "A practical mimicry attack against powerful system-call monitors", Technical Report SECLAB07-01, Secure Systems Laboratory, Stony Brook University, 2007
    • (2007)
    • Parampalli, C.1    Sekar, R.2    Johnson, R.3
  • 5
    • 0034829697 scopus 로고    scopus 로고
    • R. Sekar, M. Bendre, and P. Bollineni, A fast automaton-based method for detecting anomalous program behaviors, in Proceedings of the 2001 IEEE Symposium on Security and Privacy, USA, 2001, p. 0144
    • R. Sekar, M. Bendre, and P. Bollineni, "A fast automaton-based method for detecting anomalous program behaviors", in Proceedings of the 2001 IEEE Symposium on Security and Privacy, USA, 2001, p. 0144
  • 7
    • 55849117253 scopus 로고    scopus 로고
    • http://nvd.nist.gov/nvd.cfm


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.