-
2
-
-
84874286016
-
-
[cited 2012 26 March]; Available from
-
Maslennikov, D. Mobile Malware Evolution, Part 5. 2012 [cited 2012 26 March]; Available from: www.securelist.com/en/analysis/204792222/Mobile-Malware- Evolution-Part-5.
-
(2012)
Mobile Malware Evolution, Part 5
-
-
Maslennikov, D.1
-
5
-
-
34249865012
-
Research on Intrusion Detection and Response: A Survey
-
Peyman Kabiri, A.A.G., Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 2005. 1(2): p. 84-102.
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 84-102
-
-
Kabiri, P.1
G, A.A.2
-
6
-
-
48349134267
-
Behavioral detection of malware: From a survey towards an established taxonomy
-
Grégoire Jacob, H.D., Eric Filiol, Behavioral detection of malware: from a survey towards an established taxonomy. JOURNAL IN COMPUTER VIROLOGY, 2008. 4 (3): p. 251-266.
-
(2008)
Journal in Computer Virology
, vol.4
, Issue.3
, pp. 251-266
-
-
Jacob, G.1
D, H.2
Filiol, E.3
-
7
-
-
68049121093
-
Anomaly detection: A survey
-
Varun Chandola, A.B., Vipin Kumar, Anomaly detection: A survey. ACM Computing Surveys, 2009. 41 (3): p. 1-56.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-56
-
-
Chandola, V.1
B, A.2
Kumar, V.3
-
8
-
-
84872403568
-
A Survey on Security for Mobile Devices
-
Mariantonietta La Polla, F.M., Daniele Sgandurra, A Survey on Security for Mobile Devices. IEEE COMMUNICATIONS SURVEYS & TUTORIALS, 2012. PP(99): p. 1-26.
-
(2012)
IEEE Communications Surveys & Tutorials
, vol.PP
, Issue.99
, pp. 1-26
-
-
La Polla, M.1
M, F.2
Sgandurra, D.3
-
9
-
-
84874572569
-
Malware Detection Based on Structral and Behavioural Features of API calls
-
Manoun Alazab, R.L., Sitalakshmi Venkataraman, Paul Watter, Malware Detection Based on Structral and Behavioural Features of API calls, in 1st International Cyber Resilience Conference2010: Perth Western, Australia.
-
1st International Cyber Resilience Conference2010: Perth Western, Australia
-
-
Alazab, M.1
L, R.2
Venkataraman, S.3
Watter, P.4
-
11
-
-
79956336732
-
SplitScreen: Enabling Efficient, Distributed Malware Detection
-
April, 2011
-
Sang Kil Cha, I.M., Jiyong Jang, John Truelove, David Brumley, David Andersen, SplitScreen: Enabling Efficient, Distributed Malware Detection. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2011. 13 (April, 2011).
-
(2011)
Journal of Communications and Networks
, vol.13
-
-
Cha, S.K.1
M, I.2
Jang, J.3
Truelove, J.4
Brumley, D.5
Andersen, D.6
-
12
-
-
0016518897
-
Efficient String Matching: An aid to bibliographic search
-
06, June
-
Alfred V. Aho, M.J.C., Efficient String Matching: An aid to bibliographic search. Communications of the ACM, 1975. 18 (06, June): p. 333-340.
-
(1975)
Communications of the ACM
, vol.18
, pp. 333-340
-
-
Aho, A.V.1
C, M.J.2
-
16
-
-
8344251916
-
Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection
-
Nathan Tuckt, T.S., Brad Caldert, George Varghese, Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, in IEEE INFOCOM 20042004: China. p. 2628-2639.
-
IEEE INFOCOM 20042004: China
, pp. 2628-2639
-
-
Tuckt, N.1
S, T.2
Caldert, B.3
Varghese, G.4
-
17
-
-
38549173266
-
High-Performance Pattern-Matching for Intrusion Detection
-
Van Lunteren, J., High-Performance Pattern-Matching for Intrusion Detection, in IEEE INFOCOM2006: Spain.
-
IEEE INFOCOM2006: Spain
-
-
Van Lunteren, J.1
-
18
-
-
77958533075
-
A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap
-
Weizhe Zhang, Y.Z., Hongli Zhang, Xuemai Gu, Cheng, A.M.K, A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap, in ICICSE2009: Harbin, China. p. 1-5.
-
ICICSE2009: Harbin, China
, pp. 1-5
-
-
Zhang, W.1
Z, Y.2
Zhang, H.3
Gu, X.4
Cheng, A.M.K.5
-
19
-
-
78651410113
-
An Android Application Sandbox System for Suspicious Software Detection
-
Thomas Blasing, L.B., Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, and Sahin Albayrak, An Android Application Sandbox System for Suspicious Software Detection, in Malicious and Unwanted Software (MALWARE)2010: Nancy, Lorraine. p. 55-62.
-
Malicious and Unwanted Software (MALWARE)2010: Nancy, Lorraine
, pp. 55-62
-
-
Blasing, T.1
B, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
20
-
-
85025700509
-
A Study of Android Application Security
-
William Enck, D.O., Patrick McDaniel, Swarat Chaudhuri, A Study of Android Application Security, in 20th USENIX Security Symposium2011: San Francisco, USA.
-
20th USENIX Security Symposium2011: San Francisco, USA
-
-
Enck, W.1
O, D.2
McDaniel, P.3
Chaudhuri, S.4
-
21
-
-
78549255566
-
Behavior-Based Malware Detection on Mobile Phone
-
Shuaifu Dai, Y.L., Tielei Wang, Tao Wei, Wei Zou, Behavior-Based Malware Detection on Mobile Phone, in Wireless Communications Networking and Mobile Computing (WiCOM)2010: Chengdu, China. p. 1-4.
-
Wireless Communications Networking and Mobile Computing (WiCOM)2010: Chengdu, China
, pp. 1-4
-
-
Dai, S.1
L, Y.2
Wang, T.3
Wei, T.4
Zou, W.5
-
22
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
Abhijit Bose, X.H., Kang G. Shin, Taejoon Park, Behavioral detection of malware on mobile handsets, in MobiSys 20082008: Breckenridge, CO, USA. p. 225-238.
-
MobiSys 20082008: Breckenridge, CO, USA
, pp. 225-238
-
-
Bose, A.1
H, X.2
Shin, K.G.3
Park, T.4
-
23
-
-
57349195106
-
Detecting Energy-Greedy Anomalies and Mobile Malware Variants
-
Hahnsang Kim, J.S., Kang G. Shin, Detecting Energy-Greedy Anomalies and Mobile Malware Variants, in MobiSys 082008: Breckenridge, CO, USA. p. 239-252.
-
MobiSys 082008: Breckenridge, CO, USA
, pp. 239-252
-
-
Kim, H.1
S, J.2
Shin, K.G.3
-
24
-
-
51449120796
-
Mobile Device Profiling and Intrusion Detection using Smart Batteries
-
Timothy K. Buennemeyer, T.M.N., Lee M. Clagett, John P. Dunning, Randy C. Marchany, Joseph G. Tront, Mobile Device Profiling and Intrusion Detection using Smart Batteries, in HICSS 2008: Waikoloa, Hawaii. p. 296.
-
HICSS 2008: Waikoloa, Hawaii
, pp. 296
-
-
Buennemeyer, T.K.1
N, T.M.2
Clagett, L.M.3
Dunning, J.P.4
Marchany, R.C.5
Tront, J.G.6
-
25
-
-
58349116007
-
Monitoring Smartphones for Anomaly Detection
-
February 2009
-
Aubrey-Derrick Schmidt, F.P., Florian Lamour, Christian Scheel, Seyit Ahmet Çamtepe, Sahin Albayrak, Monitoring Smartphones for Anomaly Detection. Mobile Networks and Applications, 2009. 14(February 2009): p. 92-106.
-
(2009)
Mobile Networks and Applications
, vol.14
, pp. 92-106
-
-
Schmidt, A.-D.1
P, F.2
Lamour, F.3
Scheel, C.4
Çamtepe, S.A.5
Albayrak, S.6
-
26
-
-
35448979944
-
SmartSiren: Virus detection and alert for smartphones
-
Jerry Cheng, S.H.Y.W., Hao Yang, Songwu Lu, SmartSiren: virus detection and alert for smartphones, in MobiSys 2007 2007: San Juan, Puerto Rico. p. 258-271.
-
MobiSys 2007 2007: San Juan, Puerto Rico
, pp. 258-271
-
-
Cheng, J.1
W, S.H.Y.2
Yang, H.3
Lu, S.4
-
27
-
-
70449482715
-
Static Analysis of Executables for Collaborative Malware Detection on Android
-
Aubrey-Derrick Schmidt, R.B., Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer A. Yüksel, Seyit A. Camtepe, Sahin Albayrak, Static Analysis of Executables for Collaborative Malware Detection on Android, in IEEE International Conference on Communication 2009: Dresden, Germany. p. 1-5.
-
IEEE International Conference on Communication 2009: Dresden, Germany
, pp. 1-5
-
-
Aubrey-Derrick1
Schmidt2
B, R.3
Schmidt, H.-G.4
Clausen, J.5
Kiraz, O.6
Yüksel, K.A.7
Camtepe, S.A.8
Albayrak, S.9
-
28
-
-
77950125602
-
Detecting Symbian OS Malware through Static Function Call Analysis
-
Aubrey-Derrick Schmidt, J.H.C., Ahmet Camtepe, and Sahin Albayrak, Detecting Symbian OS Malware through Static Function Call Analysis, in Malicious and Unwanted Software (MALWARE) 2009: Montreal, Qc, Canada. p. 15-22.
-
Malicious and Unwanted Software (MALWARE) 2009: Montreal, Qc, Canada
, pp. 15-22
-
-
Schmidt, A.-D.1
C, J.H.2
Camtepe, A.3
Albayrak, S.4
-
29
-
-
84855822423
-
Using Static Analysis for Automatic Assessment and Mitigation of Unwanted and Malicious ActivitiesWithin Android Applications
-
Leonid Batyuk, M.H., Seyit Ahmet Camtepe,Karsten Raddatz, Aubrey-Derrick Schmidt, and Sahin Albayrak, Using Static Analysis for Automatic Assessment and Mitigation of Unwanted and Malicious ActivitiesWithin Android Applications, in 6th International Conference on Malicious and Unwanted Software 2011: Fajardo, PR, USA. p. 66-72.
-
6th International Conference on Malicious and Unwanted Software 2011: Fajardo, PR, USA
, pp. 66-72
-
-
Batyuk, L.1
H, M.2
Camtepe, S.A.3
Raddatz, K.4
Schmidt, A.-D.5
Albayrak, S.6
|