-
3
-
-
77955875227
-
-
"Android Developers," http://developer.android.com/index.html.
-
-
-
-
5
-
-
33750436929
-
About malicious software in smartphones
-
Nov.
-
S. Töyssy and M. Helenius, "About malicious software in smartphones," Journal in Computer Virology, vol. 2, Nov. 2006, pp. 109-119.
-
(2006)
Journal in Computer Virology
, vol.2
, pp. 109-119
-
-
Töyssy, S.1
Helenius, M.2
-
6
-
-
57349123036
-
Can you infect me now?: Malware propagation in mobile phone networks
-
Virginia, USA: ACM
-
C. Fleizach, M. Liljenstam, P. Johansson, G.M. Voelker, and A. Mehes, "Can you infect me now?: malware propagation in mobile phone networks," Proceedings of the 2007 ACM workshop on Recurring malcode, Alexandria, Virginia, USA: ACM, 2007, pp. 61-68.
-
(2007)
Proceedings of the 2007 ACM Workshop on Recurring Malcode, Alexandria
, pp. 61-68
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.M.4
Mehes, A.5
-
7
-
-
77950125580
-
-
Technische Universit\ät Berlin, DAI-Labor, Tech. Rep. TUB-DAI
-
A. Schmidt and S. Albayrak, "Malicious software for smartphones," Technische Universit\ät Berlin, DAI-Labor, Tech. Rep. TUB-DAI, vol. 2, 2008, pp. 08-01.
-
(2008)
Malicious Software for Smartphones
, vol.2
, pp. 8-11
-
-
Schmidt, A.1
Albayrak, S.2
-
8
-
-
48749129898
-
On the Effort to Create Smartphone Worms in Windows Mobile
-
M. Becher, F.C. Freiling, and B. Leider, "On the Effort to Create Smartphone Worms in Windows Mobile," Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, 2007, pp. 199-206.
-
Information Assurance and Security Workshop, 2007. IAW '07. IEEE SMC, 2007
, pp. 199-206
-
-
Becher, M.1
Freiling, F.C.2
Leider, B.3
-
9
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
A.-. Schmidt, H.-. Schmidt, L. Batyuk, J.H. Clausen, S.A. Camtepe, S. Albayrak, and C. Yildizli, "Smartphone malware evolution revisited: Android next target?," Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, 2009, pp. 1 -7.
-
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference On, 2009
, pp. 1-7
-
-
Schmidt, A.1
Schmidt, H.2
Batyuk, L.3
Clausen, J.H.4
Camtepe, S.A.5
Albayrak, S.6
Yildizli, C.7
-
10
-
-
74349101560
-
Using end-to-middle security to protect against evil twin access points
-
E.Y. Chen and M. Ito, "Using end-to-middle security to protect against evil twin access points," 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, Kos, Greece: 2009, pp. 1-6.
-
2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops, Kos, Greece: 2009
, pp. 1-6
-
-
Chen, E.Y.1
Ito, M.2
-
12
-
-
70350136710
-
The Case for VM-based Cloudlets in Mobile Computing
-
M. Satyanarayanan, V. Bahl, R. Caceres, and N. Davies, "The Case for VM-based Cloudlets in Mobile Computing," IEEE Pervasive Computing, 2009.
-
(2009)
IEEE Pervasive Computing
-
-
Satyanarayanan, M.1
Bahl, V.2
Caceres, R.3
Davies, N.4
-
13
-
-
11244308946
-
MobiDesk: Mobile virtual desktop computing
-
Philadelphia, PA, USA: ACM
-
R.A. Baratto, S. Potter, G. Su, and J. Nieh, "MobiDesk: mobile virtual desktop computing," Proceedings of the 10th annual international conference on Mobile computing and networking, Philadelphia, PA, USA: ACM, 2004, pp. 1-15.
-
(2004)
Proceedings of the 10th Annual International Conference on Mobile Computing and Networking
, pp. 1-15
-
-
Baratto, R.A.1
Potter, S.2
Su, G.3
Nieh, J.4
-
14
-
-
34247464801
-
Highly Reliable Mobile Desktop Computing in Your Pocket
-
S. Potter and J. Nieh, "Highly Reliable Mobile Desktop Computing in Your Pocket," Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International, 2006, pp. 247 -254.
-
Computer Software and Applications Conference, 2006. COMPSAC '06. 30th Annual International, 2006
, pp. 247-254
-
-
Potter, S.1
Nieh, J.2
-
17
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Breckenridge, CO, USA: ACM
-
A. Bose, X. Hu, K.G. Shin, and T. Park, "Behavioral detection of malware on mobile handsets," Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp. 225-238.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
18
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Breckenridge, CO, USA: ACM
-
H. Kim, J. Smith, and K.G. Shin, "Detecting energy-greedy anomalies and mobile malware variants," Proceeding of the 6th international conference on Mobile systems, applications, and services, Breckenridge, CO, USA: ACM, 2008, pp. 239-252.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
19
-
-
77950125602
-
Detecting Symbian OS malware through static function call analysis
-
A.-. Schmidt, J.H. Clausen, A. Camtepe, and S. Albayrak, "Detecting Symbian OS malware through static function call analysis," Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, 2009, pp. 15-22.
-
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, 2009
, pp. 15-22
-
-
Schmidt, A.1
Clausen, J.H.2
Camtepe, A.3
Albayrak, S.4
-
20
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
A. Schmidt, F. Peters, F. Lamour, C. Scheel, S.A. Çamtepe, and S. Albayrak, "Monitoring smartphones for anomaly detection," Mob. Netw. Appl., vol. 14, 2009, pp. 92-106.
-
(2009)
Mob. Netw. Appl.
, vol.14
, pp. 92-106
-
-
Schmidt, A.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Çamtepe, S.A.5
Albayrak, S.6
-
21
-
-
74949101283
-
Designing System-Level Defenses against Cellphone Malware
-
L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu, "Designing System-Level Defenses against Cellphone Malware," Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on, 2009, pp. 83-90.
-
Reliable Distributed Systems, 2009. SRDS '09. 28th IEEE International Symposium on, 2009
, pp. 83-90
-
-
Xie, L.1
Zhang, X.2
Chaugule, A.3
Jaeger, T.4
Zhu, S.5
-
22
-
-
77955912325
-
Mobile Malware: Threats and Prevention
-
Z. Cheng, "Mobile Malware: Threats and Prevention," McAfee Avert.
-
McAfee Avert
-
-
Cheng, Z.1
|