-
1
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Bose, A., Hu, X., Shin, K.G., Park, T.: Behavioral detection of malware on mobile handsets. In: Proceedings of MobiSys 2008 (2008)
-
(2008)
Proceedings of MobiSys
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
4
-
-
84868175603
-
-
http://www.redherring.com/Home/19081
-
-
-
-
5
-
-
84956820389
-
Knowledge-based management of cellular clone fraud
-
Boston, MA, USA
-
Davis, A.B., Goyal, S.K.: Knowledge-based management of cellular clone fraud. In: Proceedings of IEEE PIMRC 1992, Boston, MA, USA (1992)
-
(1992)
Proceedings of IEEE PIMRC
-
-
Davis, A.B.1
Goyal, S.K.2
-
6
-
-
33745796561
-
Exploiting open functionality in SMS-capable cellular networks
-
Enck, W., Traynor, P., McDaniel, P., Porta, T.L.: Exploiting open functionality in SMS-capable cellular networks. In: Proceedings of CCS 2005 (2005)
-
(2005)
Proceedings of CCS
-
-
Enck, W.1
Traynor, P.2
McDaniel, P.3
Porta, T.L.4
-
7
-
-
0002656796
-
Activity monitoring: Noticing interesting changes in behavior
-
Fawcett, T., Provost, F.: Activity monitoring: noticing interesting changes in behavior. In: Proceedings of ACM KDD 1999 (1999)
-
(1999)
Proceedings of ACM KDD
-
-
Fawcett, T.1
Provost, F.2
-
8
-
-
36349005250
-
A malware signature extraction and detection method applied to mobile networks
-
April
-
Hu, G., Venugopal, D.: A malware signature extraction and detection method applied to mobile networks. In: Proceedings of IPCCC 2007 (April 2007)
-
(2007)
Proceedings of IPCCC
-
-
Hu, G.1
Venugopal, D.2
-
9
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proceedings of MobiSys (2008)
-
(2008)
Proceedings of MobiSys
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
11
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
Lee, W., Xiang, D.: Information-theoretic measures for anomaly detection. In: Proceedings of IEEE S&P (2001)
-
(2001)
Proceedings of IEEE S&P
-
-
Lee, W.1
Xiang, D.2
-
13
-
-
34548364116
-
Analysis of the reliability of a nationwide short message service
-
Meng, X., Zerfos, P., Samanta, V., Wong, S.H.Y., Lu, S.: Analysis of the reliability of a nationwide short message service. In: Proceedings of INFOCOM 2007 (2007)
-
(2007)
Proceedings of INFOCOM 2007
-
-
Meng, X.1
Zerfos, P.2
Samanta, V.3
Wong, S.H.Y.4
Lu, S.5
-
15
-
-
84868173719
-
-
http://www.vnunet.com/vnunet/news/2163586/sms-phishing-attack-seen-wild
-
-
-
-
16
-
-
84868182680
-
-
http://www.kval.com/news/local/17945949.html
-
-
-
-
17
-
-
84868175631
-
-
http://www.mobilemarketer.com/cms/opinion/columns/1610.html
-
-
-
-
18
-
-
84868180909
-
-
http://www.textually.org/textually/archives/2007/12/018482.htm
-
-
-
-
19
-
-
84868180912
-
-
http://www.openmindnetworks.com/SMSSpoofing.asp
-
-
-
-
20
-
-
33747144912
-
Behavior-based modeling and its application to email analysis
-
Stolfo, S.J., Hershkop, S., Hu, C., Li, W., Nimeskern, O., Wang, K.: Behavior-based modeling and its application to email analysis. ACM Transactions on Internet Technology 6(2), 187-221 (2006)
-
(2006)
ACM Transactions on Internet Technology
, vol.6
, Issue.2
, pp. 187-221
-
-
Stolfo, S.J.1
Hershkop, S.2
Hu, C.3
Li, W.4
Nimeskern, O.5
Wang, K.6
-
21
-
-
33746368048
-
Enhancing security using mobility-based anomaly detection in cellular mobile networks
-
Sun, B., Yu, F., Wu, K., Xiao, Y., Leung, V.C.M.: Enhancing security using mobility-based anomaly detection in cellular mobile networks. IEEE Trans. on Vehicular Technology 55(3) (2006)
-
(2006)
IEEE Trans. on Vehicular Technology
, vol.55
, Issue.3
-
-
Sun, B.1
Yu, F.2
Wu, K.3
Xiao, Y.4
Leung, V.C.M.5
-
22
-
-
76649137098
-
-
http://searchcio-midmarket.techtarget.com/tip/0,289483,sid183-gci1310706, 00.html
-
http://searchcio-midmarket.techtarget.com/tip/0,289483,sid183-gci1310706, 00.html
-
-
-
-
23
-
-
84892142402
-
Fraud detection in communications networks using neural and probabilistic methods
-
Taniguchi, M., Haft, M., Hollmn, J., Tresp, V.: Fraud detection in communications networks using neural and probabilistic methods. In: Proceedings of the 1998 IEEE International Conference in Acoustics, Speech and Signal Processing (1998)
-
(1998)
Proceedings of the 1998 IEEE International Conference in Acoustics, Speech and Signal Processing
-
-
Taniguchi, M.1
Haft, M.2
Hollmn, J.3
Tresp, V.4
-
24
-
-
33751040642
-
Mitigating attacks on open functionality in SMS-capable cellular networks
-
Traynor, P., Enck, W., McDaniel, P., Porta, T.L.: Mitigating attacks on open functionality in SMS-capable cellular networks. In: Proceedings of MobiCom 2006 (2006)
-
(2006)
Proceedings of MobiCom
-
-
Traynor, P.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
25
-
-
70349149823
-
Mobi-watchdog: You can steal
-
Zurich, Switzerland
-
Yan, G., Eidenbenz, S., Sun, B.: Mobi-watchdog: you can steal, but you can't run! In: Proceedings of ACM WiSec 2009, Zurich, Switzerland (2009)
-
(2009)
but you can't run! In: Proceedings of ACM WiSec
-
-
Yan, G.1
Eidenbenz, S.2
Sun, B.3
-
26
-
-
85084096599
-
Catching instant messaging worms with change-point detection techniques
-
Berkeley, CA, USA
-
Yan, G., Xiao, Z., Eidenbenz, S.: Catching instant messaging worms with change-point detection techniques. In: LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats, Berkeley, CA, USA (2008)
-
(2008)
LEET 2008: Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats
-
-
Yan, G.1
Xiao, Z.2
Eidenbenz, S.3
-
27
-
-
34547479979
-
A study of the short message service of a nationwide cellular carrier
-
Zerfos, P., Meng, X., Samanta, V., Wong, S.H.Y., Lu, S.: A study of the short message service of a nationwide cellular carrier. In: Proceedings of IMC 2006 (2006)
-
(2006)
Proceedings of IMC
-
-
Zerfos, P.1
Meng, X.2
Samanta, V.3
Wong, S.H.Y.4
Lu, S.5
|