메뉴 건너뛰기




Volumn , Issue , 2009, Pages 559-563

Mobile and ubiquitous malware

Author keywords

Cellphone; Mobile malware; Mobile phone; Mobile security; Mobile virus; Mobile worm; PDA; Smartphone; Ubiquitous malware

Indexed keywords

CELL PHONE; MALWARES; MOBILE MALWARE; MOBILE SECURITY; SMART PHONES;

EID: 77955118139     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1821748.1821856     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 1
    • 57349125651 scopus 로고    scopus 로고
    • Behavioral detection of malware on mobile handsets
    • Bose, A., Hu, X., Shin, K.G., and Park, T. 2008. Behavioral detection of malware on mobile handsets. MobiSys'08. 225-238.
    • (2008) MobiSys'08 , pp. 225-238
    • Bose, A.1    Hu, X.2    Shin, K.G.3    Park, T.4
  • 3
    • 35448979944 scopus 로고    scopus 로고
    • SmartSiren: Virus detection and alert for smartphones
    • Cheng, J., Wong, S.H.Y., Yang, H., and Lu, S. 2007. SmartSiren: Virus detection and alert for smartphones. MobiSys'07. 258 - 271.
    • (2007) MobiSys'07 , pp. 258-271
    • Cheng, J.1    Wong, S.H.Y.2    Yang, H.3    Lu, S.4
  • 5
    • 58349112392 scopus 로고    scopus 로고
    • 29 September Available at
    • Gostev, A. 29 September 2006. Mobil emalware evolution. Viruslist.com. Available at http://www.viruslist.com/en/analysis?pubid=200119916
    • (2006) Mobil Emalware Evolution
    • Gostev, A.1
  • 6
    • 84868499312 scopus 로고    scopus 로고
    • Kentynet. 11 November
    • Kentynet. 11 November 2008. Smartphone. Wikipedia. http://en.wikipedia. org/wiki/Smartphone
    • (2008) Smartphone
  • 7
    • 77955116377 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • Available at
    • Leavitt, N. 2005. Mobile phones: The next frontier for hackers? Technology News. Available at http://ieeexplore.ieee.org/stamp/stamp.jsp? arnumber=01432639.
    • (2005) Technology News
    • Leavitt, N.1
  • 8
    • 33750334282 scopus 로고    scopus 로고
    • Testing and evaluating virus detectors for handheld devices
    • doi:10.1007/s11416-006-0024-y
    • Morales, J.A., Clarke, P.J., Deng, Y., and Kibria, B.M.G. 2006. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology 2(2). 135 - 147. doi:10.1007/s11416-006-0024-y.
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 135-147
    • Morales, J.A.1    Clarke, P.J.2    Deng, Y.3    Kibria, B.M.G.4
  • 12
    • 33750436929 scopus 로고    scopus 로고
    • About malicious software in smartphones
    • Toyssy, S., and Helenius, M. 2006. About malicious software in smartphones. Journal in Computer Virology 2(2). 109-119.
    • (2006) Journal in Computer Virology , vol.2 , Issue.2 , pp. 109-119
    • Toyssy, S.1    Helenius, M.2
  • 13
    • 77952121608 scopus 로고    scopus 로고
    • An efficient signature representation and matching method for mobile devices
    • Venugopal, D. 2006. An efficient signature representation and matching method for mobile devices. WICON'06.
    • (2006) WICON'06
    • Venugopal, D.1
  • 14
    • 77955121442 scopus 로고    scopus 로고
    • F-secure warns of mobile malware growth
    • 13 November
    • Williams, I. 13 November 2008. F-Secure warns of mobile malware growth. businessGreen.com
    • (2008) BusinessGreen.com
    • Williams, I.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.