-
1
-
-
77952338561
-
-
http://en.wikipedia.org/wiki/cross-validation.
-
-
-
-
2
-
-
77952385692
-
-
http://trolltech.com/products/qtopia.
-
-
-
-
3
-
-
77952339871
-
-
http://www.elinux.org/osk.
-
-
-
-
4
-
-
77952347075
-
-
http://www.f-secure.com/v-descs/flexispy-a.shtml.
-
-
-
-
5
-
-
77952400527
-
-
http://www.uscert. gov/press-room/trendsandanalysisq108.pdf.
-
-
-
-
6
-
-
77952330109
-
-
http://www.virtuallogix.com/.
-
-
-
-
7
-
-
77952358614
-
-
mcafee.com/us/research/mobile-security-report-2008.html
-
Mcafee mobile security report 2008, mcafee.com/us/research/mobile- security-report-2008.html.
-
Mcafee Mobile Security Report 2008
-
-
-
9
-
-
77952381006
-
-
Mobile device ui design, http://blueflavor.com/blog/ 2006/apr/04/mobile- device-ui-design/.
-
Mobile Device Ui Design
-
-
-
10
-
-
77952405549
-
-
OpenMoko. http://wiki.openmoko.org.
-
-
-
-
13
-
-
70349721172
-
Behavioral detection of malware on mobile handsets
-
A. Bose and et al. Behavioral detection of malware on mobile handsets. In Proc. of MobiSys, 2008.
-
(2008)
Proc. of MobiSys
-
-
Bose, A.1
-
14
-
-
57349142501
-
Proactive security for mobile messaging networks
-
A. Bose and K. Shin. Proactive security for mobile messaging networks. In Proc. of WiSe, 2006.
-
(2006)
Proc. of WiSe
-
-
Bose, A.1
Shin, K.2
-
25
-
-
57649211221
-
One-handed touchscreen input for legacy applications
-
pages
-
A. K. Karlson and B. B. Bederson. One-handed touchscreen input for legacy applications. In Proc. of CHI, pages 1399-1408, 2008
-
(2008)
Proc. of CHI
, pp. 1399-1408
-
-
Karlson, A.K.1
Bederson, B.B.2
-
27
-
-
77952374488
-
Security information: Virus encyclopedia: Symbos-comwar.a: Technical details
-
M. Lactaotao. Security information: Virus encyclopedia: Symbos-comwar.a: Technical details. Trend Micro Inc., 2005.
-
(2005)
Trend Micro Inc.
-
-
Lactaotao, M.1
-
28
-
-
0002774999
-
Learning patterns from unix process execution traces for intrustion detection
-
W. Lee, S. Stolfo, and P. Chan. Learning patterns from unix process execution traces for intrustion detection. In Proc. of AAAI, 1997.
-
(1997)
Proc. of AAAI
-
-
Lee, W.1
Stolfo, S.2
Chan, P.3
-
30
-
-
57349112465
-
Using labeling to prevent cross-service attacks against smartphones
-
C. Mulliner, G. Vigna, D. Dagon, and W. Lee. Using labeling to prevent cross-service attacks against smartphones. In DIMVA, 2006.
-
(2006)
DIMVA
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
31
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
D. Muthukumaran, A. Sawani, J. Schiffman, B. M. Jung, and T. Jaeger. Measuring integrity on mobile phone systems. In Proc. of the 13th ACM Symposium on Access Control Models and Technologies, 2008.
-
(2008)
Proc. of the 13th ACM Symposium on Access Control Models and Technologies
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
32
-
-
0024610919
-
A tutorial on hidden markov models and selected applications in speech recognition
-
L. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proc. of the IEEE, 1989.
-
(1989)
Proc. of the IEEE
-
-
Rabiner, L.1
-
33
-
-
67049128150
-
Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery
-
R. Racic, D. Ma, and H. Chen. Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery. In IEEE SecureComm, 2006.
-
(2006)
IEEE SecureComm
-
-
Racic, R.1
Ma, D.2
Chen, H.3
-
36
-
-
45349099441
-
The shannon lecture: Hidden markov models and the baum-welch algorithm
-
L. Welch. The shannon lecture: Hidden markov models and the baum-welch algorithm. In IEEE Information Theory Society Newsletter, 2003.
-
(2003)
IEEE Information Theory Society Newsletter
-
-
Welch, L.1
-
37
-
-
0037636215
-
Intrusion detection using variable length audit trail patterns
-
A. Wespi, M. Dacier, and H. Debar. Intrusion detection using variable length audit trail patterns. In Proc. of RAID, 2000.
-
(2000)
Proc. of RAID
-
-
Wespi, A.1
Dacier, M.2
Debar, H.3
-
39
-
-
74949101283
-
Designing system-level defenses against cellphone malware
-
L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu. Designing System-level Defenses against Cellphone Malware. In Proc. of 28th IEEE International Symposium on Reliable Distributed Systems (SRDS), 2009.
-
(2009)
Proc. of 28th IEEE International Symposium on Reliable Distributed Systems (SRDS)
-
-
Xie, L.1
Zhang, X.2
Chaugule, A.3
Jaeger, T.4
Zhu, S.5
-
40
-
-
0037209446
-
Host-based intrustion detection using dynamic and static behavioral models
-
D. Yeung and Y. Ding. Host-based intrustion detection using dynamic and static behavioral models. In Pattern Recognition, Issue.1, 2003.
-
(2003)
Pattern Recognition
, Issue.1
-
-
Yeung, D.1
Ding, Y.2
|