-
1
-
-
33749016105
-
-
Available online at 2010
-
P. Ferrie, P. Szor, R. Stanev, and R. Mouritzen, "Security responses: symbos.cabir," Symantec Corporation, 2004. Available online at http://www.symantec.com/security-response/writeup.jsp?docid=2004-061419-4412-99, 2010.
-
(2004)
Security Responses: Symbos.cabir
-
-
Ferrie, P.1
Szor, P.2
Stanev, R.3
Mouritzen, R.4
-
3
-
-
44649187943
-
Is it finally time to worry about mobile malware
-
G. Lawton, "Is it finally time to worry about mobile malware," Computer, vol. 41, no. 5, pp. 12-14, 2008.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
4
-
-
34547919197
-
The future of mobile malware
-
Shane Coursen, "The future of mobile malware," Network Security, vol. 2007, issue 8, pp. 7-11, 2007.
-
(2007)
Network Security
, vol.2007
, Issue.8
, pp. 7-11
-
-
Coursen, S.1
-
5
-
-
78649255520
-
Mobile threats - Myth or reality
-
Nov. Available online at 2010.
-
Yury, "Mobile threats - myth or reality," Kaspersky Lab's Report on Mobile Viruses. Nov. 2006. Available online at http://www.viruslist. com/en/weblog?weblogid=204924390 , 2010.
-
(2006)
Kaspersky Lab's Report on Mobile Viruses
-
-
-
6
-
-
0038182929
-
Methodologies, tools and languages for building ontologies: Where is their meeting point
-
O. Corcho, M. Fernández-López, and A. Gómez- Pérez, "Methodologies, tools and languages for building ontologies: where is their meeting point," Data Knowledge Engineering, vol. 46, no. 1, pp. 41-64, 2003.
-
(2003)
Data Knowledge Engineering
, vol.46
, Issue.1
, pp. 41-64
-
-
Corcho, O.1
Fernández-López, M.2
Gómez-Pérez, A.3
-
9
-
-
0029410109
-
CYC: A large-scale investment in knowledge infrastructure
-
D. B. Lenat, "CYC: a large-scale investment in knowledge infrastructure," Communications of the ACM, vol. 38, no. 11, pp. 33-38, 1995.
-
(1995)
Communications of the ACM
, vol.38
, Issue.11
, pp. 33-38
-
-
Lenat, D.B.1
-
10
-
-
0002883741
-
Building and reusing ontologies for electrical network applications
-
Budapest, Hungary
-
A. Bernaras, I. Laresgoiti, and J. Corera, "Building and reusing ontologies for electrical network applications," in Proc. the European Conference on Artificial Intelligence (ECAI'96), pp. 298-302, Budapest, Hungary, 1996.
-
(1996)
Proc. the European Conference on Artificial Intelligence (ECAI'96)
, pp. 298-302
-
-
Bernaras, A.1
Laresgoiti, I.2
Corera, J.3
-
12
-
-
27544433210
-
Semantics-aware malware detection
-
May
-
M. Christodorescu, S. Jha, S.A. Seshia, D. Song, and R.E. Bryant, "Semantics-aware malware detection," in Proc. the IEEE Symposium on Security and Privacy, Oakland, California, pp. 32-46, May 2005.
-
(2005)
Proc. the IEEE Symposium on Security and Privacy, Oakland, California
, pp. 32-46
-
-
Christodorescu, M.1
Jha, S.2
Seshia, S.A.3
Song, D.4
Bryant, R.E.5
-
13
-
-
33750334282
-
Testing and evaluating virus detectors for handheld devices
-
J. A. Morales, P. J. Clarke, Y. Deng, and B. M. Golam Kibria, "Testing and evaluating virus detectors for handheld devices", Journal in Computer Virology, vol. 2, no. 2, pp. 135-147, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 135-147
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Golam Kibria, B.M.4
-
14
-
-
33745641552
-
Anomalous payload-based worm detection and signature generation
-
Sep.
-
K. Wang, G. Cretu, and S. J. Stolfo, "Anomalous payload-based worm detection and signature generation," in Proc. the 8th International Symposium of Recent Advances in Intrusion Detection (RAID 2005), pp. 227-246, Sep. 2005.
-
(2005)
Proc. the 8th International Symposium of Recent Advances in Intrusion Detection (RAID 2005)
, pp. 227-246
-
-
Wang, K.1
Cretu, G.2
Stolfo, S.J.3
-
15
-
-
14944379887
-
A behavioral approach to worm detection
-
D. R. Ellis, J. G. Aiken, K. S. Attwood, and S. D. Tenaglia, "A behavioral approach to worm detection," in Proc. the 2004 ACM Workshop on Rapid Malcode (WORM), pp. 43-53, 2004.
-
(2004)
Proc. the 2004 ACM Workshop on Rapid Malcode (WORM)
, pp. 43-53
-
-
Ellis, D.R.1
Aiken, J.G.2
Attwood, K.S.3
Tenaglia, S.D.4
-
18
-
-
38649083121
-
An epidemic model of mobile phone virus
-
H. Zheng, D. Li, and Z. Gao, "An epidemic model of mobile phone virus," in Proc. the 2006 1st International Symposium on Pervasive Computing and Applications, pp. 1-5, 2006.
-
(2006)
Proc. the 2006 1st International Symposium on Pervasive Computing and Applications
, pp. 1-5
-
-
Zheng, H.1
Li, D.2
Gao, Z.3
-
19
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
J. Cheng, S. Wong, H. Yang, and S. Lu. "Smartsiren: virus detection and alert for smartphones", In Proceeding of the 5th ACM International conference on Mobile systems, applications, and services, San Juan, Puerto Rico, pp. 258-271, 2007.
-
(2007)
Proceeding of the 5th ACM International Conference on Mobile Systems, Applications, and Services, San Juan, Puerto Rico
, pp. 258-271
-
-
Cheng, J.1
Wong, S.2
Yang, H.3
Lu, S.4
-
20
-
-
19944369062
-
Soft tamper-proofing via program integrity verification in wireless sensor networks
-
P. Taejoon and K. G. Shin, "Soft tamper-proofing via program integrity verification in wireless sensor networks," IEEE Transactions on Mobile Computing, vol. 4 no. 3 pp. 297-309, 2005.
-
(2005)
IEEE Transactions on Mobile Computing
, vol.4
, Issue.3
, pp. 297-309
-
-
Taejoon, P.1
Shin, K.G.2
-
21
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
th ACM International Conference on Mobile Systems, Applications, and Services, pp. 239-252, 2008.
-
(2008)
th ACM International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
24
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
A. Bose, Xin Hu, K. G. Shin, and Tajoon Park, "Behavioral detection of malware on mobile handsets," in Proc. the 6th ACM international conference on Mobile systems, applications, and services, Breckenridge, CO, USA, pp. 225-238, 2008.
-
(2008)
Proc. the 6th ACM International Conference on Mobile Systems, Applications, and Services, Breckenridge, CO, USA
, pp. 225-238
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
25
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
A. Schmidt, F. Peters, F. Lamour, C. Scheel, S. A. Camtepe, and S. Albayrak, "Monitoring smartphones for anomaly detection," Mobile Networks and Applications, vol. 14, no. 1, pp. 92-106, 2009.
-
(2009)
Mobile Networks and Applications
, vol.14
, Issue.1
, pp. 92-106
-
-
Schmidt, A.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Camtepe, S.A.5
Albayrak, S.6
-
27
-
-
79953725427
-
Powerscope: A tool for profiling the energy usage of mobile applications
-
New Orleans, Louisiana, Feb.
-
J. Flinn and M. Satyanarayanan, "Powerscope: a tool for profiling the energy usage of mobile applications," in Proc. Second IEEE Workshop on Mobile Computing Systems and Applications, pp. 1-9, New Orleans, Louisiana, Feb. 1999.
-
(1999)
Proc. Second IEEE Workshop on Mobile Computing Systems and Applications
, pp. 1-9
-
-
Flinn, J.1
Satyanarayanan, M.2
-
30
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
D. H. Shih, B. Lin, H. S. Chiang, and M. H. Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management and Data Systems, vol. 108, no. 4, pp. 478-494, 2008.
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.H.1
Lin, B.2
Chiang, H.S.3
Shih, M.H.4
-
31
-
-
78649311900
-
-
Available online at
-
Protégé 4.0, Available online at http://protege.stanford. edu/, 2010.
-
(2010)
Protégé 4.0
-
-
|