-
2
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Bose, A.; Hu, X.; Shin, K. G.; & Park, T. (2008). Behavioral detection of malware on mobile handsets. In Proc. of the 6th international conference on mobile systems, applications, and services.
-
(2008)
Proc. of the 6th International Conference on Mobile Systems, Applications, and Services
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
3
-
-
63049091681
-
From desktop to mobile: Examining the security experience
-
10.1016/j.cose.2008.11.001
-
RA Botha SM Furnell NL Clarke 2009 From desktop to mobile: Examining the security experience Computer & Security 28 130 137 10.1016/j.cose.2008.11. 001
-
(2009)
Computer & Security
, vol.28
, pp. 130-137
-
-
Botha, R.A.1
Furnell, S.M.2
Clarke, N.L.3
-
4
-
-
51449120796
-
Mobile device profiling and intrusion detection using smart batteries
-
Buennemeyer, T. K.; et al. (2008). Mobile device profiling and intrusion detection using smart batteries. In International conference on system sciences (pp. 296-296).
-
(2008)
International Conference on System Sciences
, pp. 296-296
-
-
Buennemeyer T., .K.1
-
7
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
Cheng, J.; Wong, S. H.; Yang, H.; & Lu, S. (2007). SmartSiren: Virus detection and alert for smartphones. In Proceedings of the 5th international conference on mobile systems, applications and services.
-
(2007)
Proceedings of the 5th International Conference on Mobile Systems, Applications and Services
-
-
Cheng, J.1
Wong, S.H.2
Yang, H.3
Lu, S.4
-
8
-
-
10944254818
-
Mobile phones as computing devices: The viruses are coming!
-
DOI 10.1109/MPRV.2004.21
-
C Dagon T Martin T Starner 2004 Mobile phones as computing devices the viruses are coming Pervasive Computing 3 11 15 10.1109/MPRV.2004.21 (Pubitemid 40010893)
-
(2004)
IEEE Pervasive Computing
, vol.3
, Issue.4
, pp. 11-15
-
-
Dagon, D.1
Martin, T.2
Starner, T.3
-
9
-
-
0031269184
-
On the optimality of the simple bayesian classifier under zero-One loss
-
P Domingos M Pazzani 1997 On the optimality of simple Bayesian classifier under zero-one loss Machine Learning 29 103 130 10.1023/A:1007413511361 0892.68076 (Pubitemid 127510035)
-
(1997)
Machine Learning
, vol.29
, Issue.2-3
, pp. 103-130
-
-
Domingos, P.1
Pazzani, M.2
-
10
-
-
84903607772
-
Dynamic spyware analysis
-
Egele, M.; Krugel, C.; Kirda, E.; Yin, H.; & Song, D. (2007). Dynamic spyware analysis. In USENIX annual technical conference (pp. 233-246).
-
(2007)
USENIX annual technical conference
, pp. 233-246
-
-
Egele, M.1
Krugel, C.2
Kirda, E.3
Yin, H.4
Song, D.5
-
11
-
-
33750962703
-
Mobile malware - new avenues
-
DOI 10.1016/S1353-4858(06)70450-0, PII S1353485806704500
-
D Emm 2006 Mobile malware - new avenues Network Security 2006 11 4 6 10.1016/S1353-4858(06)70450-0 (Pubitemid 44739351)
-
(2006)
Network Security
, vol.2006
, Issue.11
, pp. 4-6
-
-
Emm, D.1
-
15
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
10.1016/j.cose.2008.08.003
-
P Garcia-Teodoro J Diaz-Verdejo G Macia-Fernandez E Vazquez 2009 Anomaly-based network intrusion detection: Techniques, systems and challenges Computers & Security 28 1-2 18 28 10.1016/j.cose.2008.08.003
-
(2009)
Computers & Security
, vol.28
, Issue.12
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Diaz-Verdejo, J.2
MacIa-Fernandez, G.3
Vazquez, E.4
-
16
-
-
0033569406
-
Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring
-
10.1126/science.286.5439.531
-
T Golub, et al. 1999 Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring Science 286 531 537 10.1126/science.286.5439.531
-
(1999)
Science
, vol.286
, pp. 531-537
-
-
Golub, T.1
-
20
-
-
57849163559
-
Keystroke dynamics-based authentication for mobile devices
-
10.1016/j.cose.2008.10.002
-
SS Hwang S Cho S Park 2009 Keystroke dynamics-based authentication for mobile devices Computer & Security 28 85 93 10.1016/j.cose.2008.10.002
-
(2009)
Computer & Security
, vol.28
, pp. 85-93
-
-
Hwang, S.S.1
Cho, S.2
Park, S.3
-
22
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
10.1007/s11416-008-0086-0
-
G Jacob H Debar E Filiol 2008 Behavioral detection of malware: From a survey towards an established taxonomy Journal in Computer Virology 4 251 266 10.1007/s11416-008-0086-0
-
(2008)
Journal in Computer Virology
, vol.4
, pp. 251-266
-
-
Jacob, G.1
Debar, H.2
Filiol, E.3
-
26
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
Kim, H.; Smith, J.; & Shin, K. G. (2008). Detecting energy-greedy anomalies and mobile malware variants. In Proceeding of the 6th international conference on mobile systems, applications, and services.
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
28
-
-
18144370814
-
Mobile phones: The next frontier for hackers?
-
N Leavitt 2005 Mobile phones: The next frontier for hackers? Computer 38 4 20 23 10.1109/MC.2005.134 (Pubitemid 40608419)
-
(2005)
Computer
, vol.38
, Issue.4
, pp. 20-23
-
-
Leavitt, N.1
-
32
-
-
58549090885
-
Improving malware detection by applying multi-inducer ensemble
-
10.1016/j.csda.2008.10.015 2657107
-
E Menahem A Shabtai L Rokach Y Elovici 2008 Improving malware detection by applying multi-inducer ensemble Computational Statistics and Data Analysis 53 4 1483 1494 10.1016/j.csda.2008.10.015 2657107
-
(2008)
Computational Statistics and Data Analysis
, vol.53
, Issue.4
, pp. 1483-1494
-
-
Menahem, E.1
Shabtai, A.2
Rokach, L.3
Elovici, Y.4
-
35
-
-
2942660612
-
Novel techniques for fraud detection in mobile telecommunication networks
-
Moreau, Y.; Preneel, B.; Burge, P.; Shawe-Taylor, J.; Stoermann, C.; & Cooke, C. (1997). Novel techniques for fraud detection in mobile telecommunication networks. In ACTS mobile summit.
-
(1997)
ACTS Mobile Summit
-
-
Moreau, Y.1
Preneel, B.2
Burge, P.3
Shawe-Taylor, J.4
Stoermann, C.5
Cooke, C.6
-
37
-
-
42749086128
-
Detection of unknown computer worms based on behavioral classification of the host
-
10.1016/j.csda.2008.01.028 05565036 2432480
-
R Moskovitch Y Elovici L Rokach 2008 Detection of unknown computer worms based on behavioral classification of the host Computational Statistics and Data Analysis 52 9 4544 4566 10.1016/j.csda.2008.01.028 05565036 2432480
-
(2008)
Computational Statistics and Data Analysis
, vol.52
, Issue.9
, pp. 4544-4566
-
-
Moskovitch, R.1
Elovici, Y.2
Rokach, L.3
-
39
-
-
33644854066
-
Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices
-
Nash, D. C.; et al. (2005). Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices. In Pervasive computing and communications workshops.
-
(2005)
Pervasive Computing and Communications Workshops
-
-
Nash, D.C.1
-
43
-
-
10644275203
-
Embedded devices next on the virus target list
-
10.1049/ess:20040612
-
M Piercy 2004 Embedded devices next on the virus target list IEEE Electronics Systems and Software 2 42 43 10.1049/ess:20040612
-
(2004)
IEEE Electronics Systems and Software
, vol.2
, pp. 42-43
-
-
Piercy, M.1
-
45
-
-
49949090311
-
Learning and classification of malware behavior
-
Rieck, K.; Holz, T.; Willems, C.; Düssel, P.; & Laskov, P. (2008). Learning and classification of malware behavior. In Proc. of the conference on detection of intrusions and malware & vulnerability assessment (pp. 108-125).
-
(2008)
Proc. of the Conference on Detection of Intrusions and Malware & Vulnerability Assessment
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Düssel, P.4
Laskov, P.5
-
47
-
-
0031234827
-
IDAMN: An intrusion detection architecture for mobile networks
-
PII S0733871697058472
-
D Samfat R Molva 1997 IDAMN: An intrusion detection architecture for mobile networks IEEE Journal on Selected Areas in Communications 15 7 1373 1380 10.1109/49.622919 (Pubitemid 127566448)
-
(1997)
IEEE Journal on Selected Areas in Communications
, vol.15
, Issue.7
, pp. 1373-1380
-
-
Samfat, D.1
Molva, R.2
-
48
-
-
84867833971
-
Enhancing security of linux-based android devices
-
Schmidt, A. D.; Schmidt, H. G.; Yüksel, K. A.; Kiraz, O.; Camptepe, S. A.; & Albayrak, S. (2008). Enhancing security of linux-based android devices. In Proc. of the 15th international linux system technology conference.
-
(2008)
Proc. of the 15th International Linux System Technology Conference
-
-
Schmidt, A.D.1
Schmidt, H.G.2
Yüksel, K.A.3
Kiraz, O.4
Camptepe, S.A.5
Albayrak, S.6
-
50
-
-
84856213457
-
Detecting malicious applications on android by applying machine learning classifiers to static features (Poster)
-
Presented in the Honolulu, Hawaii
-
Shabtai, A.; Fledel, Y.; & Elovici, Y. (2009a). Detecting malicious applications on android by applying machine learning classifiers to static features (Poster). Presented in the 25th annual computer security applications conference (ACSAC). Honolulu, Hawaii.
-
(2009)
25th Annual Computer Security Applications Conference (ACSAC)
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
52
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-The-art survey
-
10.1016/j.istr.2009.03.003
-
A Shabtai R Moskovitch Y Elovici C Glezer 2009 Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey Information Security Technical Report 14 1 1 34 10.1016/j.istr.2009.03.003
-
(2009)
Information Security Technical Report
, vol.14
, Issue.1
, pp. 1-34
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
53
-
-
77955177819
-
-
CoRR abs/0912.5101
-
Shabtai, A.; Fledel, Y.; Kanonov, U.; Elovici, Y.; & Dolev, S. (2009d). Google android: A state-of-the-art review of security mechanisms. CoRR abs/0912.5101.
-
(2009)
Google Android: A State-of-the-art Review of Security Mechanisms
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
54
-
-
77953137615
-
Intrusion detection on mobile devices using the knowledge based temporal-abstraction method
-
10.1016/j.jss.2010.03.046
-
A Shabtai U Kanonov Y Elovici 2010 Intrusion detection on mobile devices using the knowledge based temporal-abstraction method Journal of Systems and Software 83 8 1524 1537 10.1016/j.jss.2010.03.046
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
55
-
-
77950675112
-
Google android: A comprehensive security assessment
-
doi: 10.1109/MSP.2010.2
-
Shabtai, A.; Fledel, Y.; Kanonov, U.; Elovici, Y.; Dolev, S.; & Glezer, C. (2010b) Google android: A comprehensive security assessment. IEEE Security and Privacy Magazine. doi: 10.1109/MSP.2010.2.
-
(2010)
IEEE Security and Privacy Magazine
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
56
-
-
84856043672
-
The mathematical theory of communication
-
1154.94303 26286
-
CE Shannon 1948 The mathematical theory of communication The Bell system Technical Journal 27 3 379 423 1154.94303 26286
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
57
-
-
42549166924
-
Security aspects of mobile phone virus: A critical survey
-
DOI 10.1108/02635570810868344
-
DH Shih B Lin HS Chiang MH Shih 2008 Security aspects of mobile phone virus: A critical survey Industrial Management & Data Systems 108 4 478 494 10.1108/02635570810868344 (Pubitemid 351590943)
-
(2008)
Industrial Management and Data Systems
, vol.108
, Issue.4
, pp. 478-494
-
-
Shih, D.-H.1
Lin, B.2
Chiang, H.-S.3
Shih, M.-H.4
-
58
-
-
26444504890
-
A mobile phone malicious software detection model with behavior checker
-
Web and Communication Technologies and Internet-Related Social Issues - HSI 2005: 3rd International Conference on Human.Society@Internet. Proceedings
-
TS Yap HT Ewe 2005 A mobile phone malicious software detection model with behavior checker Lecture Notes in Computer Science 3597 57 65 10.1007/115277257 (Pubitemid 41435937)
-
(2005)
Lecture Notes in Computer Science
, vol.3597
, pp. 57-65
-
-
Yap, T.S.1
Ewe, H.T.2
-
59
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
Yin, H.; Song, D.; Egele, M.; Krugel, C.; & Kirda, E. (2007). Panorama: Capturing system-wide information flow for malware detection and analysis. In ACM conference on computer and communications security.
-
(2007)
ACM Conference on Computer and Communications Security
-
-
Yin, H.1
Song, D.2
Egele, M.3
Krugel, C.4
Kirda, E.5
|