-
1
-
-
82655162792
-
Cells: A virtual mobile smartphone architecture
-
New York, New York, USA: ACM Press
-
J. Andrus, C. Dall, A. V. Hof, O. Laadan, and J. Nieh, "Cells: a virtual mobile smartphone architecture," in Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11. New York, New York, USA: ACM Press, 2011, p. 173.
-
(2011)
Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11
, pp. 173
-
-
Andrus, J.1
Dall, C.2
Hof, A.V.3
Laadan, O.4
Nieh, J.5
-
2
-
-
84879762665
-
-
Duo Security, "X-Ray," 2012, http://www.xray.io/.
-
(2012)
Duo Security
-
-
-
4
-
-
84879746047
-
-
Google, "Google Wallet," 2011, www.google.com/wallet/.
-
(2011)
Google Wallet
-
-
-
5
-
-
80755181021
-
A survey of mobile malware in the wild
-
New York, New York, USA: ACM Press, Oct.
-
A. P. Felt, M. Finifter, E. Chin, S. Hanna, and D. Wagner, "A survey of mobile malware in the wild," in Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices - SPSM '11. New York, New York, USA: ACM Press, Oct. 2011, p. 3.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM '11
, pp. 3
-
-
Felt, A.P.1
Finifter, M.2
Chin, E.3
Hanna, S.4
Wagner, D.5
-
6
-
-
84861120099
-
Framework for assessing the trustworthiness of cloud resources
-
IEEE, Mar.
-
M. Kuehnhausen, V. S. Frost, and G. J. Minden, "Framework for assessing the trustworthiness of cloud resources," in 2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support. IEEE, Mar. 2012, pp. 142-145.
-
(2012)
2012 IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support
, pp. 142-145
-
-
Kuehnhausen, M.1
Frost, V.S.2
Minden, G.J.3
-
7
-
-
84869432690
-
Using Probabilistic Generative Models for Ranking Risks of Android Apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molly, "Using Probabilistic Generative Models for Ranking Risks of Android Apps," in ACM Conference on Computer and Communications Security, Oct. 2012.
-
ACM Conference on Computer and Communications Security, Oct. 2012
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molly, I.8
-
9
-
-
84856043672
-
A Mathematical Theory of Communication
-
C. E. Shannon, "A Mathematical Theory of Communication," Bell System Technical Journal, vol. 27, no. July, pp. 379-423, 1948.
-
(1948)
Bell System Technical Journal
, vol.27
, pp. 379-423
-
-
Shannon, C.E.1
-
10
-
-
83255191401
-
Finding deceptive opinion spam by any stretch of the imagination
-
M. Ott, Y. Choi, C. Cardie, and J. T. Hancock, "Finding deceptive opinion spam by any stretch of the imagination," in HLT '11 Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Jun. 2011, pp. 309-319.
-
HLT '11 Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, Jun. 2011
, pp. 309-319
-
-
Ott, M.1
Choi, Y.2
Cardie, C.3
Hancock, J.T.4
-
11
-
-
84860868145
-
Spotting fake reviewer groups in consumer reviews
-
New York, New York, USA: ACM Press
-
A. Mukherjee, B. Liu, and N. Glance, "Spotting fake reviewer groups in consumer reviews," in Proceedings of the 21st international conference on World Wide Web - WWW '12. New York, New York, USA: ACM Press, 2012, p. 191.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web - WWW '12
, pp. 191
-
-
Mukherjee, A.1
Liu, B.2
Glance, N.3
-
15
-
-
80755187788
-
Android permissions demystified
-
New York, New York, USA: ACM Press, Oct.
-
A. P. Felt, E. Chin, S. Hanna, D. Song, and D. Wagner, "Android permissions demystified," in Proceedings of the 18th ACM conference on Computer and communications security - CCS '11. New York, New York, USA: ACM Press, Oct. 2011, p. 627.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security - CCS '11
, pp. 627
-
-
Felt, A.P.1
Chin, E.2
Hanna, S.3
Song, D.4
Wagner, D.5
-
16
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in WebApps'11 Proceedings of the 2nd USENIX conference on Web application development, Jun. 2011, p. 7.
-
WebApps'11 Proceedings of the 2nd USENIX Conference on Web Application Development, Jun. 2011
, pp. 7
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
17
-
-
0001368374
-
Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines
-
P. Jaccard, "Distribution de la flore alpine dans le bassin des Dranses et dans quelques régions voisines," Bulletin de la Société Vaudoise des Sciences Naturelles, no. 37, pp. 241-272, 1901.
-
(1901)
Bulletin de la Société Vaudoise des Sciences Naturelles
, Issue.37
, pp. 241-272
-
-
Jaccard, P.1
|