-
2
-
-
80052155252
-
-
2010. Virus Library: http://www.viruslibrary.com/.
-
(2010)
-
-
-
4
-
-
0036749185
-
Behavior-based intrusion detection in mobile phone systems
-
A. Boukerche and M. S. M. A. Notare. Behavior-based intrusion detection in mobile phone systems. Jour. Paral. & Dist. Comp., 62(9):1476-1490, 2002.
-
(2002)
Jour. Paral. & Dist. Comp.
, vol.62
, Issue.9
, pp. 1476-1490
-
-
Boukerche, A.1
Notare, M.S.M.A.2
-
5
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
DOI 10.1145/1247660.1247690, MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
J. Cheng, S. H. Wong, H. Yang, and S. Lu. Smartsiren: virus detection and alert for smartphones. In MobiSys, pages 258- 271, New York, NY, USA, 2007. ACM. (Pubitemid 47620930)
-
(2007)
MobiSys'07: Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
, pp. 258-271
-
-
Cheng, J.1
Wong, S.H.Y.2
Yang, H.3
Lu, S.4
-
6
-
-
10444252457
-
Mobile phone vulnerabilities: A new generation of malware
-
J. Jamaluddin, N. Zotou, and P. Coulton. Mobile phone vulnerabilities: a new generation of malware. In Consumer Electronics, 2004 IEEE International Symposium on, pages 199 - 202, 2004.
-
(2004)
Consumer Electronics, 2004 IEEE International Symposium on
, pp. 199-202
-
-
Jamaluddin, J.1
Zotou, N.2
Coulton, P.3
-
7
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
Citeseer
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, and F. Jahanian. Virtualized in-cloud security services for mobile devices. In Proceedings of the First Workshop on Virtualization in Mobile Computing, pages 31-35. Citeseer, 2008.
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
8
-
-
78751498804
-
Paranoid Android: Versatile protection for smartphones
-
ACM
-
G. Portokalidis, P. Homburg, K. Anagnostakis, and H. Bos. Paranoid Android: versatile protection for smartphones. In Proceedings of the 26th Annual Computer Security Applications Conference, pages 347-356. ACM, 2010.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
9
-
-
84857164924
-
Soundminer: A stealthy and context-aware sound trojan for smartphones
-
R. Schlegel, K. Zhang, X. Zhou, M. Intwala, A. Kapadia, and X. Wang. Soundminer: A Stealthy and Context-Aware Sound Trojan for Smartphones. In NDSS, 2011.
-
(2011)
NDSS
-
-
Schlegel, R.1
Zhang, K.2
Zhou, X.3
Intwala, M.4
Kapadia, A.5
Wang, X.6
-
10
-
-
78650164959
-
Cost-aware systemwide intrusion defense via online forensics and ondemand detector deployment
-
S. A. Zonouz, K. Joshi, and W. H. Sanders. Cost-aware systemwide intrusion defense via online forensics and ondemand detector deployment. In CCS-SafeConfig, pages 71 - 74, 2010.
-
(2010)
CCS-SafeConfig
, pp. 71-74
-
-
Zonouz, S.A.1
Joshi, K.2
Sanders, W.H.3
-
11
-
-
70450092394
-
Rre: A game-theoretic intrusion response and recovery engine
-
S. A. Zonouz, H. Khurana, W. Sanders, and T. Yardley. Rre: A game-theoretic intrusion response and recovery engine. In DSN, pages 439 -448, 2009.
-
(2009)
DSN
, pp. 439-448
-
-
Zonouz, S.A.1
Khurana, H.2
Sanders, W.3
Yardley, T.4
|