-
1
-
-
48749129898
-
On the effort to create smart-phone worms in windows mobile
-
20-22 June
-
Michael Becher, Felix C. Freiling, and Boris Leidner. On the Effort to Create Smart-phone Worms in Windows Mobile. In Information Assurance and Security Workshop, 2007, pages 199-206, 20-22 June 2007.
-
(2007)
Information Assurance and Security Workshop, 2007
, pp. 199-206
-
-
Becher, M.1
Freiling, F.C.2
Leidner, B.3
-
3
-
-
34047180005
-
Studying bluetooth malware propagation: The BlueBag project
-
Luca Carettoni, Claudio Merloni, and Stefano Zanero. Studying Bluetooth Malware Propagation: The BlueBag Project. IEEE Security and Privacy, 5(2):17-25, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 17-25
-
-
Carettoni, L.1
Merloni, C.2
Zanero, S.3
-
4
-
-
57349123036
-
Can you infect me now? Malware propagation in mobile phone networks
-
Chris Fleizach, Michael Liljenstam, Per Johansson, Geoffrey Voelker, and András Mehés. Can you infect me now? Malware Propagation in Mobile Phone Networks. In WORM, 2007.
-
(2007)
WORM
-
-
Fleizach, C.1
Liljenstam, M.2
Johansson, P.3
Voelker, G.4
Mehés, A.5
-
5
-
-
37849044998
-
Measurement and analysis of autonomous spreading malware in a university environment
-
Bernhard M. Hämmerli and Robin Sommer, editors Springer
-
Jan Goebel, Thorsten Holz, and Carsten Willems. Measurement and Analysis of Autonomous Spreading Malware in a University Environment. In Bernhard M. Hämmerli and Robin Sommer, editors, DIMVA, volume 4579 of Lecture Notes in Computer Science, pages 109-128. Springer, 2007.
-
(2007)
DIMVA, Volume 4579 of Lecture Notes in Computer Science
, pp. 109-128
-
-
Goebel, J.1
Holz, T.2
Willems, C.3
-
7
-
-
57349144743
-
-
Scientific American
-
Mikko Hypponen. Malware goes Mobile. Scientific American, pages 10-11, 2006.
-
(2006)
Malware Goes Mobile
, pp. 10-11
-
-
Hypponen, M.1
-
8
-
-
33750334282
-
Testing and evaluating virus detectors for handheld devices
-
Jose Andre Morales, Peter J. Clarke, Yi Deng, and B. M. Golam Kibria. Testing and evaluating virus detectors for handheld devices. Journal in Computer Virology, 2(2):135-147, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 135-147
-
-
Morales, J.A.1
Clarke, P.J.2
Deng, Y.3
Golam Kibria, B.M.4
-
9
-
-
34548737161
-
Exploring multiple execution paths for malware analysis
-
Washington, DC, USA IEEE Computer Society
-
Andreas Moser, Christopher Kruegel, and Engin Kirda. Exploring Multiple Execution Paths for Malware Analysis. In SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pages 231-245, Washington, DC, USA, 2007. IEEE Computer Society.
-
(2007)
SP '07: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 231-245
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
11
-
-
33750436929
-
About malicious software in smartphones
-
Sampo Toyssy and Marko Helenius. About malicious software in smartphones. Journal in Computer Virology, 2(2):109-119, 2006.
-
(2006)
Journal in Computer Virology
, vol.2
, Issue.2
, pp. 109-119
-
-
Toyssy, S.1
Helenius, M.2
-
12
-
-
34047110218
-
Toward automated dynamic malware analysis using CWSandbox
-
Carsten Willems, Thorsten Holz, and Felix Freiling. Toward Automated Dynamic Malware Analysis Using CWSandbox. IEEE Security and Privacy, 5(2):32-39, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.2
, pp. 32-39
-
-
Willems, C.1
Holz, T.2
Freiling, F.3
-
13
-
-
85084161247
-
Why johnny can't encrypt: A usability evaluation of PGP 5.0
-
Berkeley, CA, USA USENIX Association
-
Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. In SSYM'99: Proceedings of the 8th conference on USENIX Security Symposium, pages 14-14, Berkeley, CA, USA, 1999. USENIX Association.
-
(1999)
SSYM'99: Proceedings of the 8th Conference on USENIX Security Symposium
, pp. 14-14
-
-
Whitten, A.1
Tygar, J.D.2
-
14
-
-
34748827408
-
Bluetooth worm propagation: Mobility pattern matters!
-
New York, NY, USA ACM Press
-
Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas Hengartner, Stephan Eidenbenz, and Vincent Vu. Bluetooth worm propagation: mobility pattern matters! In ASIACCS '07: Proceedings of the 2nd ACM symposium on Information, computer and communications security, pages 32-44, New York, NY, USA, 2007. ACM Press.
-
(2007)
ASIACCS '07: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security
, pp. 32-44
-
-
Yan, G.1
Flores, H.D.2
Cuellar, L.3
Hengartner, N.4
Eidenbenz, S.5
Vu, V.6
|