메뉴 건너뛰기




Volumn , Issue , 2012, Pages 79-86

Smartphone malware detection: From a survey towards taxonomy

Author keywords

Anomaly based technique; Dynamic Analysis; Signature based technique; Smartphone Malware Detection; Static Analysis; Survey

Indexed keywords

ANALYSIS APPROACH; ANOMALY-BASED TECHNIQUE; DETECTOR EFFICIENCY; LITERATURE REVIEWS; MALWARES; SIGNATURE-BASED TECHNIQUE; SMARTPHONE MALWARE; STATE OF THE ART;

EID: 84874555690     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/MALWARE.2012.6461012     Document Type: Conference Paper
Times cited : (31)

References (29)
  • 2
    • 84874286016 scopus 로고    scopus 로고
    • [cited 2012 26 March]; Available from
    • Maslennikov, D. Mobile Malware Evolution, Part 5. 2012 [cited 2012 26 March]; Available from: www.securelist.com/en/analysis/204792222/Mobile-Malware- Evolution-Part-5.
    • (2012) Mobile Malware Evolution, Part 5
    • Maslennikov, D.1
  • 5
    • 34249865012 scopus 로고    scopus 로고
    • Research on Intrusion Detection and Response: A Survey
    • Peyman Kabiri, A.A.G., Research on Intrusion Detection and Response: A Survey. International Journal of Network Security, 2005. 1(2): p. 84-102.
    • (2005) International Journal of Network Security , vol.1 , Issue.2 , pp. 84-102
    • Kabiri, P.1    G, A.A.2
  • 6
    • 48349134267 scopus 로고    scopus 로고
    • Behavioral detection of malware: From a survey towards an established taxonomy
    • Grégoire Jacob, H.D., Eric Filiol, Behavioral detection of malware: from a survey towards an established taxonomy. JOURNAL IN COMPUTER VIROLOGY, 2008. 4 (3): p. 251-266.
    • (2008) Journal in Computer Virology , vol.4 , Issue.3 , pp. 251-266
    • Jacob, G.1    D, H.2    Filiol, E.3
  • 7
  • 12
    • 0016518897 scopus 로고
    • Efficient String Matching: An aid to bibliographic search
    • 06, June
    • Alfred V. Aho, M.J.C., Efficient String Matching: An aid to bibliographic search. Communications of the ACM, 1975. 18 (06, June): p. 333-340.
    • (1975) Communications of the ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    C, M.J.2
  • 16
    • 8344251916 scopus 로고    scopus 로고
    • Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection
    • Nathan Tuckt, T.S., Brad Caldert, George Varghese, Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection, in IEEE INFOCOM 20042004: China. p. 2628-2639.
    • IEEE INFOCOM 20042004: China , pp. 2628-2639
    • Tuckt, N.1    S, T.2    Caldert, B.3    Varghese, G.4
  • 17
    • 38549173266 scopus 로고    scopus 로고
    • High-Performance Pattern-Matching for Intrusion Detection
    • Van Lunteren, J., High-Performance Pattern-Matching for Intrusion Detection, in IEEE INFOCOM2006: Spain.
    • IEEE INFOCOM2006: Spain
    • Van Lunteren, J.1
  • 18
  • 23
    • 57349195106 scopus 로고    scopus 로고
    • Detecting Energy-Greedy Anomalies and Mobile Malware Variants
    • Hahnsang Kim, J.S., Kang G. Shin, Detecting Energy-Greedy Anomalies and Mobile Malware Variants, in MobiSys 082008: Breckenridge, CO, USA. p. 239-252.
    • MobiSys 082008: Breckenridge, CO, USA , pp. 239-252
    • Kim, H.1    S, J.2    Shin, K.G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.