-
1
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Bose, A., Hu, X., Shin, K.G., and Park, T. 2008. Behavioral detection of malware on mobile handsets. MobiSys'08. 225-238.
-
(2008)
MobiSys'08
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
3
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
Cheng, J., Wong, S.H.Y., Yang, H., and Lu, S. 2007. SmartSiren: Virus detection and alert for smartphones. MobiSys'07. 258 - 271.
-
(2007)
MobiSys'07
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
5
-
-
58349112392
-
-
29 September Available at
-
Gostev, A. 29 September 2006. Mobil emalware evolution. Viruslist.com. Available at http://www.viruslist.com/en/analysis?pubid=200119916
-
(2006)
Mobil Emalware Evolution
-
-
Gostev, A.1
-
6
-
-
84868499312
-
-
Kentynet. 11 November
-
Kentynet. 11 November 2008. Smartphone. Wikipedia. http://en.wikipedia. org/wiki/Smartphone
-
(2008)
Smartphone
-
-
-
7
-
-
77955116377
-
Mobile phones: The next frontier for hackers?
-
Available at
-
Leavitt, N. 2005. Mobile phones: The next frontier for hackers? Technology News. Available at http://ieeexplore.ieee.org/stamp/stamp.jsp? arnumber=01432639.
-
(2005)
Technology News
-
-
Leavitt, N.1
-
8
-
-
33750334282
-
Testing and evaluating virus detectors for handheld devices
-
doi:10.1007/s11416-006-0024-y
-
Morales, J.A., Clarke, P.J., Deng, Y., and Kibria, B.M.G. 2006. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology 2(2). 135 - 147. doi:10.1007/s11416-006-0024-y.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 135-147
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Kibria, B.M.G.4
-
11
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
November
-
Schmidt, A-D, Peters, F., Lamour, F., Scheel, C, Camtepe, S.A., and Albayrak, S. November 2008. Monitoring smartphones for anomaly detection. ACM International Conference Proceeding Series; Vol. 278, Proceedings of the 1st international conference on MOBILe Wireless MiddleWARE, Operating Systems, and Application. 92-106.
-
(2008)
ACM International Conference Proceeding Series; Vol. 278, Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, Operating Systems, and Application
, pp. 92-106
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Camtepe, S.A.5
Albayrak, S.6
-
12
-
-
33750436929
-
About malicious software in smartphones
-
Toyssy, S., and Helenius, M. 2006. About malicious software in smartphones. Journal in Computer Virology 2(2). 109-119.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Toyssy, S.1
Helenius, M.2
-
13
-
-
77952121608
-
An efficient signature representation and matching method for mobile devices
-
Venugopal, D. 2006. An efficient signature representation and matching method for mobile devices. WICON'06.
-
(2006)
WICON'06
-
-
Venugopal, D.1
-
14
-
-
77955121442
-
F-secure warns of mobile malware growth
-
13 November
-
Williams, I. 13 November 2008. F-Secure warns of mobile malware growth. businessGreen.com
-
(2008)
BusinessGreen.com
-
-
Williams, I.1
-
15
-
-
77955108606
-
A systematic approach for cell-phone worm containment
-
Xie, L., Song, H., Jaeger, T., and Zhu, S. 2007. A systematic approach for cell-phone worm containment. Workshop On Rapid Malcode Proceedings of the 2007ACM workshop on Recurring malcode. 61 - 68.
-
(2007)
Workshop on Rapid Malcode Proceedings of the 2007ACM Workshop on Recurring Malcode
, pp. 61-68
-
-
Xie, L.1
Song, H.2
Jaeger, T.3
Zhu, S.4
|