-
1
-
-
78650907819
-
-
Android, http://code.google.com/android/
-
Android
-
-
-
3
-
-
78650894309
-
-
version 1.0a
-
J2ME CLDC specifications, version 1.0a, http://jcp.org/aboutjava/ communityprocess/final/jsr030/index.html
-
J2ME CLDC Specifications
-
-
-
4
-
-
78650896755
-
-
Limo foundation, https://www.limofoundation.org
-
-
-
-
6
-
-
78650920792
-
-
Maemo, http://www.maemo.org
-
-
-
-
7
-
-
77951598471
-
-
Mcafee mobile security report (2008), http://www.mcafee.com/us/research/ mobile-security-report-2008.html
-
(2008)
Mcafee Mobile Security Report
-
-
-
8
-
-
74049105025
-
-
Mcafee mobile security report (2009), http://www.mcafee.com/us/local- content/reports/mobile-security-report-2009.pdf
-
(2009)
Mcafee Mobile Security Report
-
-
-
9
-
-
78650957726
-
-
Motomagx security, http://ecosystem.motorola.com/get-inspired/ whitepapers/security-whitepaper.pdf
-
Motomagx Security
-
-
-
10
-
-
78650860652
-
-
OpenEZX, http://wiki.openezx.org/main-page
-
-
-
-
11
-
-
78650880752
-
-
Pandalab report, http://pandalabs.pandasecurity.com/blogs/images/ pandalabs/2008/04/01/quarterly-report-pandalabs-q1-2008.pdf
-
Pandalab Report
-
-
-
18
-
-
35448979944
-
Smartsiren: Virus detection and alert for smartphones
-
Cheng, J., Wong, S., Yang, H., Lu, S.: Smartsiren: Virus detection and alert for smartphones. In: Proc. of ACM Conference on Mobile Systems, Applications (2007)
-
Proc. of ACM Conference on Mobile Systems, Applications (2007)
-
-
Cheng, J.1
Wong, S.2
Yang, H.3
Lu, S.4
-
20
-
-
60049085302
-
Understanding android security
-
Enck, W., Ongtang, M., McDaniel, P.: Understanding android security. IEEE Security & Privacy 7(1) (2009)
-
(2009)
IEEE Security & Privacy
, vol.7
, Issue.1
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
26
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H., Smith, J., Shin, K.G.: Detecting energy-greedy anomalies and mobile malware variants. In: Proc. of the International Conference on Mobile Systems, Applications, and Services (2008)
-
Proc. of the International Conference on Mobile Systems, Applications, and Services (2008)
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
29
-
-
0025442003
-
The seaview security model
-
Lunt, T., Denning, D., Schell, R., Heckman, M., Shockley, M.: The seaview security model. IEEE Transactions on Software Engineering 16(6) (1990)
-
(1990)
IEEE Transactions on Software Engineering
, vol.16
, Issue.6
-
-
Lunt, T.1
Denning, D.2
Schell, R.3
Heckman, M.4
Shockley, M.5
-
30
-
-
33746453742
-
Using labeling to prevent cross-service attacks against smart phones
-
Büschkes, R., Laskov, P. (eds.) DIMVA 2006. Springer, Heidelberg
-
Mulliner, C., Vigna, G., Dagon, D., Lee, W.: Using labeling to prevent cross-service attacks against smart phones. In: Büschkes, R., Laskov, P. (eds.) DIMVA 2006. LNCS, vol. 4064, pp. 91-108. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4064
, pp. 91-108
-
-
Mulliner, C.1
Vigna, G.2
Dagon, D.3
Lee, W.4
-
31
-
-
57349085063
-
Measuring integrity on mobile phone systems
-
Muthukumaran, D., Sawani, A., Schiffman, J., Jung, B.M., Jaeger, T.: Measuring integrity on mobile phone systems. In: Proc. of ACM SACMAT (2008)
-
Proc. of ACM SACMAT (2008)
-
-
Muthukumaran, D.1
Sawani, A.2
Schiffman, J.3
Jung, B.M.4
Jaeger, T.5
-
32
-
-
79955682848
-
Toward automated information-flow integrity verification for security-critical applications
-
Shankar, U., Jaeger, T., Sailer, R.: Toward automated information-flow integrity verification for security-critical applications. In: Proc. of NDSS (2006)
-
Proc. of NDSS (2006)
-
-
Shankar, U.1
Jaeger, T.2
Sailer, R.3
-
33
-
-
79959290358
-
Intelligent virus detection on mobile devices
-
Venugopal, D., Hu, G., Roman, N.: Intelligent virus detection on mobile devices. In: Proc. of International Conference on Privacy, Security and Trust (2006)
-
Proc. of International Conference on Privacy, Security and Trust (2006)
-
-
Venugopal, D.1
Hu, G.2
Roman, N.3
|