메뉴 건너뛰기




Volumn 4, Issue 1, 2008, Pages 33-49

Efficient signature based malware detection on mobile devices

Author keywords

Malware; Mobile and security; Signature detection

Indexed keywords


EID: 77952924818     PISSN: 1574017X     EISSN: 1875905X     Source Type: Journal    
DOI: 10.1155/2008/712353     Document Type: Article
Times cited : (58)

References (36)
  • 1
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A.V. Aho and M.J. Corasick, Efficient string matching: An aid to bibliographic search, Communications of the ACM 18(6) (1975), 333-340.
    • (1975) Communications of the ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 2
    • 0038442927 scopus 로고    scopus 로고
    • Payments and banking with mobile personal devices
    • Amir Herzberg, Payments and banking with mobile personal devices, Communications of the ACM 46(5) (2003), 53-58.
    • (2003) Communications of the ACM , vol.46 , Issue.5 , pp. 53-58
    • Herzberg, A.1
  • 5
    • 85013598807 scopus 로고    scopus 로고
    • An agent based intrusion detection model for mobile ad hoc networks
    • IOS Press
    • B.M. Reshmi and S.S. Manvi, Bhagyavati, An agent based intrusion detection model for mobile ad hoc networks, Mobile Information Systems 2(4) (2006), 169-191, IOS Press.
    • (2006) Mobile Information Systems , vol.2 , Issue.4 , pp. 169-191
    • Reshmi, B.M.1    Manvi, S.S.2    Bhagyavati3
  • 8
    • 0031191914 scopus 로고    scopus 로고
    • ARM Architecture and Systems
    • D. Jaggar, ARM Architecture and Systems, IEEE Micro 17(4) (1997), 9-11.
    • (1997) IEEE Micro , vol.17 , Issue.4 , pp. 9-11
    • Jaggar, D.1
  • 9
    • 10944254818 scopus 로고    scopus 로고
    • Mobile phones as computing devices: The viruses are coming!
    • D. Dagon, T. Martin and T. Starner, Mobile phones as computing devices: the viruses are coming!, Pervasive Computing, IEEE 3 (2004), 11-15.
    • (2004) Pervasive Computing, IEEE , vol.3
    • Dagon, D.1    Martin, T.2    Starner, T.3
  • 11
    • 33846595254 scopus 로고    scopus 로고
    • Hash-AV: Fast Virus Signature Scanning by Cache-Resident Filters
    • Erdogan, O. Pei Cao, Hash-AV: Fast Virus Signature Scanning by Cache-Resident Filters, in: IEEE Global Telecommunications Conference, 2005, 1767-1772.
    • (2005) IEEE Global Telecommunications Conference , pp. 1767-1772
    • Erdogan, O.1    Cao, P.2
  • 14
    • 0030216542 scopus 로고    scopus 로고
    • Neural Networks for Computer Virus Recognition
    • G. Tesauro, J.O. Kephart and G.B. Sorken, Neural Networks for Computer Virus Recognition, IEEE Expert 11(4) (1996), 5-6.
    • (1996) IEEE Expert , vol.11 , Issue.4 , pp. 5-6
    • Tesauro, G.1    Kephart, J.O.2    Sorken, G.B.3
  • 20
    • 85090433665 scopus 로고    scopus 로고
    • Snort-Lightweight Intrusion Detection for Networks
    • M. Roesch, Snort-Lightweight Intrusion Detection for Networks, in: Proceedings of the 13th LISA Conference, 1999, 229-238.
    • (1999) Proceedings of the 13th LISA Conference , pp. 229-238
    • Roesch, M.1
  • 22
    • 0034499471 scopus 로고    scopus 로고
    • The future generations of mobile communications based on broadband access technologies
    • S. Ohmori, Y. Yamao and N. Nakajima, The future generations of mobile communications based on broadband access technologies, Communications Magazine, IEEE 38(12) (2000), 134-142.
    • (2000) Communications Magazine, IEEE , vol.38 , Issue.12 , pp. 134-142
    • Ohmori, S.1    Yamao, Y.2    Nakajima, N.3
  • 24
    • 85013585364 scopus 로고    scopus 로고
    • on DJB hash. URL
    • R.S. Engelschall, on DJB hash. URL http://gcov.php.net/PHP 5 1/lcov/php-src/Zend/zend hash.h.gcov.php.
    • Engelschall, R.S.1
  • 29
    • 0016437461 scopus 로고
    • Approximate algorithms for 0/1 knapsack problem
    • S. Sahni, Approximate algorithms for 0/1 knapsack problem, Journal of the ACM 22(11) (1975), 115-124.
    • (1975) Journal of the ACM , vol.22 , Issue.11 , pp. 115-124
    • Sahni, S.1
  • 33
    • 85013568104 scopus 로고    scopus 로고
    • An efficient signature representation and matching method for mobile devices
    • D. Venugopal, An efficient signature representation and matching method for mobile devices, in: Proceedings of Conference on Wireless Internet, 2006.
    • (2006) Proceedings of Conference on Wireless Internet
    • Venugopal, D.1
  • 36
    • 0041473688 scopus 로고    scopus 로고
    • Intrusion Detection Techniques for Mobile Wireless Networks
    • Y. Zhang, W. Lee and Yi-an Huang, Intrusion Detection Techniques for Mobile Wireless Networks, Wireless Networks 9(5) (2003), 545-556.
    • (2003) Wireless Networks , vol.9 , Issue.5 , pp. 545-556
    • Zhang, Y.1    Lee, W.2    Huang, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.