-
2
-
-
84870769313
-
Crowdroid: Behavior-based malware detection system for android
-
U.Z. ACM October
-
Burguera, I., U.Z., Nadijm-Tehrani, S.: Crowdroid: Behavior-Based Malware Detection System for Android. In: SPSM 2011. ACM (October 2011)
-
(2011)
SPSM 2011
-
-
Burguera, I.1
Nadijm-Tehrani, S.2
-
3
-
-
33745201000
-
Anomalous system call detection
-
Mutz, D., Valeur, F., Vigna, G.: Anomalous System Call Detection. ACM Transactions on Information and System Security 9(1), 61-93 (2006)
-
(2006)
ACM Transactions on Information and System Security
, vol.9
, Issue.1
, pp. 61-93
-
-
Mutz, D.1
Valeur, F.2
Vigna, G.3
-
4
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Shabtai, A., Kanonov, U., Elovici, Y., Glezer, C., Weiss, Y.: Andromaly: a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems 38(1), 161-190 (2011)
-
(2011)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
5
-
-
84255195597
-
Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers
-
Damopoulos, D., Menesidou, S.A., Kambourakis, G., Papadaki, M., Clarke, N., Gritzalis, S.: Evaluation of Anomaly-Based IDS for Mobile Devices Using Machine Learning Classifiers. Security and Communications Networks 5(00), 1-9 (2011)
-
(2011)
Security and Communications Networks
, vol.5
, pp. 1-9
-
-
Damopoulos, D.1
Menesidou, S.A.2
Kambourakis, G.3
Papadaki, M.4
Clarke, N.5
Gritzalis, S.6
-
6
-
-
34247390110
-
Proactive security for mobile messaging networks
-
September
-
Bose, A., Shin, K.G.: Proactive Security For Mobile Messaging Networks. In: WiSe 2006 (September 2006)
-
(2006)
WiSe 2006
-
-
Bose, A.1
Shin, K.G.2
-
7
-
-
36348943408
-
How mobile host batteries can improve network security
-
Jacoby, G.A., Marchany, R., Davis IV, N.J.: How Mobile Host Batteries Can Improve Network Security. IEEE Security and Privacy 4, 40-49 (2006)
-
(2006)
IEEE Security and Privacy
, vol.4
, pp. 40-49
-
-
Jacoby, G.A.1
Marchany, R.2
Davis IV, N.J.3
-
8
-
-
58349116007
-
Monitoring smartphones for anomaly detection
-
Schmidt, A.-D., Peters, F., Lamour, F., Scheel, C., Çamtepe, S.A., Albayrak, S.: Monitoring smartphones for anomaly detection. Mob. Netw. Appl. 14(1), 92-106 (2009)
-
(2009)
Mob. Netw. Appl.
, vol.14
, Issue.1
, pp. 92-106
-
-
Schmidt, A.-D.1
Peters, F.2
Lamour, F.3
Scheel, C.4
Çamtepe, S.A.5
Albayrak, S.6
-
9
-
-
77952331717
-
PBMDS: A behavior-based malware detection system for cellphone devices
-
Hoboken, New Jersey, USA, March 22-24 ACM
-
Xie, L., Zhang, X., Seifert, J.-P., Zhu, S.: pBMDS: a behavior-based malware detection system for cellphone devices. In: Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010, Hoboken, New Jersey, USA, March 22-24, pp. 37-48. ACM (2010)
-
(2010)
Proceedings of the Third ACM Conference on Wireless Network Security, WISEC 2010
, pp. 37-48
-
-
Xie, L.1
Zhang, X.2
Seifert, J.-P.3
Zhu, S.4
-
10
-
-
34247390110
-
Proactive security for mobile messaging networks
-
DOI 10.1145/1161289.1161307, WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
-
Bose, A., Shin, K.G.: Proactive security for mobile messaging networks. In: WiSe 2006: Proceedings of the 5th ACM Workshop on Wireless Security, New York, NY, USA, pp. 95-104. ACM (2006) (Pubitemid 46634306)
-
(2006)
WiSE 2006 - Proceedings of the 5th ACM Workshop on Wireless Security
, vol.2006
, pp. 95-104
-
-
Bose, A.1
Shin, K.G.2
-
11
-
-
74049155830
-
On lightweight mobile phone application certification
-
New York, NY, USA ACM
-
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security, New York, NY, USA, pp. 235-245. ACM (2009)
-
(2009)
CCS 2009: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
12
-
-
77950851532
-
Semantically rich application-centric security in android
-
December
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. In: Annual Computer Security Applications Conference, ACSAC 2009. pp. 340-349 (December 2009)
-
(2009)
Annual Computer Security Applications Conference, ACSAC 2009
, pp. 340-349
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
13
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
Dresden, Germany, June 14-18 IEEE
-
Schmidt, A.-D., Bye, R., Schmidt, H.-G., Clausen, J.H., Kiraz, O., Yüksel, K.A., Çamtepe, S.A., Albayrak, S.: Static Analysis of Executables for Collaborative Malware Detection on Android. In: Proceedings of IEEE International Conference on Communications, ICC 2009, Dresden, Germany, June 14-18, pp. 1-5. IEEE (2009)
-
(2009)
Proceedings of IEEE International Conference on Communications, ICC 2009
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.-G.3
Clausen, J.H.4
Kiraz, O.5
Yüksel, K.A.6
Çamtepe, S.A.7
Albayrak, S.8
-
14
-
-
84872403568
-
A survey on security for mobile devices
-
La Polla, M., Martinelli, F., Sgandurra, D.: A survey on security for mobile devices. IEEE Communications Surveys Tutorials (99), 1-26 (2012)
-
(2012)
IEEE Communications Surveys Tutorials
, Issue.99
, pp. 1-26
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
15
-
-
0036127473
-
Input feature selection for classification problems
-
DOI 10.1109/72.977291, PII S1045922702003417
-
Kwak, N., Choi, C.H.: Input Feature Selection for Classification Problems. IEEE Transactions on Neural Networks 13(1), 143-159 (2002) (Pubitemid 34236844)
-
(2002)
IEEE Transactions on Neural Networks
, vol.13
, Issue.1
, pp. 143-159
-
-
Kwak, N.1
Choi, C.-H.2
-
16
-
-
77955038912
-
Diversity in smartphone usage
-
ACM June
-
Falaki, H., Mahajan, R., Kandula, S., Lymberopoulos, D., Govindan, R., Estrin, D.: Diversity in Smartphone Usage. In: MobiSys 2010. ACM (June 2010)
-
(2010)
MobiSys 2010
-
-
Falaki, H.1
Mahajan, R.2
Kandula, S.3
Lymberopoulos, D.4
Govindan, R.5
Estrin, D.6
|