-
1
-
-
22944476745
-
Mobile phones: The next frontier for hackers?
-
N. Leavitt, "Mobile phones: the next frontier for hackers?" Computer, vol. 38(4), 2005, pp. 20-23.
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
2
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
D.H. Shih, B. Lin, H.S. Chiang, M.H. Shih, "Security aspects of mobile phone virus: a critical survey," Industrial Management & Data Systems, vol. 108(4), 2008, pp. 478-494.
-
(2008)
Industrial Management & Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.H.1
Lin, B.2
Chiang, H.S.3
Shih, M.H.4
-
3
-
-
10644275203
-
Embedded devices next on the virus target list
-
M. Piercy, "Embedded devices next on the virus target list," IEEE Electronics Systems and Software, vol. 2, 2004, pp. 42-43.
-
(2004)
IEEE Electronics Systems and Software
, vol.2
, pp. 42-43
-
-
Piercy, M.1
-
4
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
J. Cheng, S.H. Wong, H. Yang, S. Lu, "SmartSiren: virus detection and alert for smartphones," Proc. International Conference on Mobile Systems, Applications and Services, 2007.
-
Proc. International Conference on Mobile Systems, Applications and Services, 2007
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
5
-
-
77955177819
-
-
CoRR abs/0912.5101
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, "Google Android: A State-of-the-Art Review of Security Mechanisms," CoRR abs/0912.5101, 2009.
-
(2009)
Google Android: A State-of-the-Art Review of Security Mechanisms
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
6
-
-
77950675112
-
Google Android: A Comprehensive Security Assessment
-
March/April
-
A. Shabtai, Y. Fledel, U. Kanonov, Y. Elovici, S. Dolev, C. Glezer, "Google Android: A Comprehensive Security Assessment," IEEE Security and Privacy, vol. 8(2), March/April 2010, pp. 35-44.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 35-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
7
-
-
77950673302
-
Securing Android-Powered Mobile Devices Using SELinux
-
May/June
-
A. Shabtai, Y. Fledel, Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security and Privacy, vol. 8(3), May/June 2010, pp. 36-44.
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.3
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
8
-
-
77953137615
-
Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method
-
A. Shabtai, U. Kanonov, Y. Elovici, "Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method," Journal of Systems and Software, vol. 83(8), 2010, pp. 1524-1537.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
10
-
-
44649187943
-
Is It Finally Time to Worry about Mobile Malware?
-
G. Lawton, "Is It Finally Time to Worry about Mobile Malware?," Computer, vol. 41(5), 2008, pp. 12-14.
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
11
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
R.A. Botha, S.M. Furnell, N.L. Clarke, "From desktop to mobile: Examining the security experience," Computer & Security, vol. 28, 2009, pp. 130-137.
-
(2009)
Computer & Security
, vol.28
, pp. 130-137
-
-
Botha, R.A.1
Furnell, S.M.2
Clarke, N.L.3
-
15
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
-
A. Shabtai, R. Moskovitch, Y. Elovici, C. Glezer, "Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey," Information Security Technical Report, vol. 14(1), 2009, pp.16-29.
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
16
-
-
0034838197
-
Data mining methods for detection of new malicious executables
-
M. Schultz, E. Eskin, E. Zadok, S. Stolfo, "Data mining methods for detection of new malicious executables. Proc. IEEE Symposium on Security and Privacy, 2001.
-
Proc. IEEE Symposium on Security and Privacy, 2001
-
-
Schultz, M.1
Eskin, E.2
Zadok, E.3
Stolfo, S.4
-
17
-
-
18844362133
-
N-gram Based Detection of New Malicious Code
-
T. Abou-Assaleh, N. Cercone, V. Keselj, R. Sweidan, "N-gram Based Detection of New Malicious Code," Proc. Annual International Computer Software and Applications Conference, 2004.
-
Proc. Annual International Computer Software and Applications Conference, 2004
-
-
Abou-Assaleh, T.1
Cercone, N.2
Keselj, V.3
Sweidan, R.4
-
19
-
-
51849107341
-
Unknown Malcode Detection via Text Categorization and the Imbalance Problem
-
R. Moskovitch, D. Stopel, C. Feher, N. Nissim, Y. Elovici, "Unknown Malcode Detection via Text Categorization and the Imbalance Problem," Proc. IEEE Intelligence and Security Informatics, Taiwan, 2008.
-
Proc. IEEE Intelligence and Security Informatics, Taiwan, 2008
-
-
Moskovitch, R.1
Stopel, D.2
Feher, C.3
Nissim, N.4
Elovici, Y.5
-
21
-
-
0003500248
-
-
Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA
-
J.R. Quinlan, "C4.5: Programs for machine learning," Morgan Kaufmann Publishers, Inc., San Francisco, CA, USA, 1993.
-
(1993)
C4.5: Programs for Machine Learning
-
-
Quinlan, J.R.1
-
29
-
-
0033569406
-
Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring
-
T. Golub, et al. "Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring," Science, vol. 286, 1999, pp. 531-537.
-
(1999)
Science
, vol.286
, pp. 531-537
-
-
Golub, T.1
-
30
-
-
84856043672
-
The mathematical theory of communication
-
C.E. Shannon, "The mathematical theory of communication," The Bell system Technical Journal, vol. 27(3), 1948, pp. 379-423.
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
|