메뉴 건너뛰기




Volumn , Issue , 2010, Pages 1080-1085

Mobile malware behavioral analysis and preventive strategy using ontology

Author keywords

Behavioral analysis; Mobile malware; Ontology; Smart phone; System security

Indexed keywords

ANTI-MALWARE; BATTERY POWER; BEHAVIORAL ANALYSIS; BLUETOOTH CONNECTIONS; DETECTION SOFTWARE; END USERS; EXTRA SERVICES; MALWARES; MEMORY CARD; MOBILE MALWARE; MOBILE PHONE NETWORKS; MULTIMEDIA MESSAGES; MULTIMEDIA MESSAGING SERVICE; ONTOLOGY-BASED; PREVENTIVE STRATEGIES; PROCESSING POWER; SIGNATURE DATABASE; SMART PHONES; STORAGE CAPACITY; SYSTEM SECURITY; USER PRIVACY;

EID: 78649239469     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SocialCom.2010.160     Document Type: Conference Paper
Times cited : (17)

References (31)
  • 3
    • 44649187943 scopus 로고    scopus 로고
    • Is it finally time to worry about mobile malware
    • G. Lawton, "Is it finally time to worry about mobile malware," Computer, vol. 41, no. 5, pp. 12-14, 2008.
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1
  • 4
    • 34547919197 scopus 로고    scopus 로고
    • The future of mobile malware
    • Shane Coursen, "The future of mobile malware," Network Security, vol. 2007, issue 8, pp. 7-11, 2007.
    • (2007) Network Security , vol.2007 , Issue.8 , pp. 7-11
    • Coursen, S.1
  • 5
    • 78649255520 scopus 로고    scopus 로고
    • Mobile threats - Myth or reality
    • Nov. Available online at 2010.
    • Yury, "Mobile threats - myth or reality," Kaspersky Lab's Report on Mobile Viruses. Nov. 2006. Available online at http://www.viruslist. com/en/weblog?weblogid=204924390 , 2010.
    • (2006) Kaspersky Lab's Report on Mobile Viruses
  • 6
    • 0038182929 scopus 로고    scopus 로고
    • Methodologies, tools and languages for building ontologies: Where is their meeting point
    • O. Corcho, M. Fernández-López, and A. Gómez- Pérez, "Methodologies, tools and languages for building ontologies: where is their meeting point," Data Knowledge Engineering, vol. 46, no. 1, pp. 41-64, 2003.
    • (2003) Data Knowledge Engineering , vol.46 , Issue.1 , pp. 41-64
    • Corcho, O.1    Fernández-López, M.2    Gómez-Pérez, A.3
  • 9
    • 0029410109 scopus 로고
    • CYC: A large-scale investment in knowledge infrastructure
    • D. B. Lenat, "CYC: a large-scale investment in knowledge infrastructure," Communications of the ACM, vol. 38, no. 11, pp. 33-38, 1995.
    • (1995) Communications of the ACM , vol.38 , Issue.11 , pp. 33-38
    • Lenat, D.B.1
  • 20
    • 19944369062 scopus 로고    scopus 로고
    • Soft tamper-proofing via program integrity verification in wireless sensor networks
    • P. Taejoon and K. G. Shin, "Soft tamper-proofing via program integrity verification in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 4 no. 3 pp. 297-309, 2005.
    • (2005) IEEE Transactions on Mobile Computing , vol.4 , Issue.3 , pp. 297-309
    • Taejoon, P.1    Shin, K.G.2
  • 28
  • 31
    • 78649311900 scopus 로고    scopus 로고
    • Available online at
    • Protégé 4.0, Available online at http://protege.stanford. edu/, 2010.
    • (2010) Protégé 4.0


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.