-
1
-
-
84881570605
-
-
AnsonAlex.com,Accessed
-
AnsonAlex.com, Smartphone Usage Statistics 2012 , Accessed 2012, http://ansonalex.com/infographics/Smartphone-usage-statistics-2012-infographic/
-
(2012)
Smartphone Usage Statistics 2012
-
-
-
2
-
-
84880283124
-
-
Accessed
-
AppBrain, Accessed 2012, http://www.appbrain.com/stats/number-ofandroid- apps
-
(2012)
AppBrain
-
-
-
3
-
-
84866720156
-
-
Juniper Networks, Inc. Accessed
-
Juniper Networks, Inc., 2011 Mobile Threats Report , Accessed 2012, https://www.juniper.net/us/en/local/pdf/additional-resources/ jnpr-2011-mobile-threats-report.pdf
-
(2012)
2011 Mobile Threats Report
-
-
-
4
-
-
84880267677
-
Trend micro
-
Accessed
-
Trend Micro, The true face of the Android threat , Accessed 2012. http://www.trendmicro.co.uk/newsroom/pr/the-true-face-of- The-androidthreat/
-
(2012)
The True Face of the Android Threat
-
-
-
5
-
-
80051969895
-
Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
-
2011 IEEE Symposium on 22-25 May
-
M. Becher, F.C. Freiling, J. Hoffmann,; T. Holz, S. Uellenbeck, C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," Security and Privacy (SP), 2011 IEEE Symposium on , vol., no., pp.96-111, 22-25 May 2011
-
(2011)
Security and Privacy (SP
, pp. 96-111
-
-
Becher, M.1
Freiling, F.C.2
Hoffmann, J.3
Holz, T.4
Uellenbeck, S.5
Wolf, C.6
-
6
-
-
78650225509
-
Business risks and security assessment for mobile devices
-
World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA
-
P. M. Milligan, D. Hutcheson, Business risks and security assessment for mobile devices. In MCBE'07: Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics. World Scientific and Engineering Academy and Society (WSEAS), Stevens Point, Wisconsin, USA, 189-193, 2007
-
(2007)
MCBE'07: Proceedings of the 8th Conference on 8th WSEAS Int. Conference on Mathematics and Computers in Business and Economics
, pp. 189-193
-
-
Milligan, P.M.1
Hutcheson, D.2
-
7
-
-
67650803219
-
An analysis of the iKee.B (Duh) iPhone botnet
-
SRI International, Dec.
-
P. Porras, H. Saidi, and V. Yegneswaran. An analysis of the iKee.B (Duh) iPhone botnet. Technical report, SRI International, Dec. 2009.
-
(2009)
Technical Report
-
-
Porras, P.1
Saidi, H.2
Yegneswaran, V.3
-
8
-
-
84855742413
-
-
InfoSecurity.com. May
-
InfoSecurity.com. Premium rate calling Android malware spotted in the wild, May 2011. http://www.infosecurity-us.com/view/18301/premiumrate-calling- android-malware-spotted-in- The-wild/.
-
(2011)
Premium Rate Calling Android Malware Spotted in the Wild
-
-
-
9
-
-
57349125651
-
Behavioral detection of malware on mobile handsets
-
June 17-20, Breckenridge, CO, USA
-
A. Bose , X. Hu , K. G. Shin , Taejoon Park, Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, June 17-20, 2008, Breckenridge, CO, USA
-
(2008)
Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services
-
-
Bose, A.1
Hu, X.2
Shin, K.G.3
Park, T.4
-
10
-
-
77956609298
-
Virtualized in-cloud security services for mobile devices
-
June 17-17, Breckenridge, Colorado
-
J. Oberheide, K. Veeraraghavan, E. Cooke, J. Flinn, F. Jahanian, Virtualized in-cloud security services for mobile devices, Proceedings of the First Workshop on Virtualization in Mobile Computing, June 17-17, 2008, Breckenridge, Colorado
-
(2008)
Proceedings of the First Workshop on Virtualization in Mobile Computing
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
12
-
-
0021404166
-
Mixture densities, maximum likelihood and the EMalgorithm
-
R.A. Redner and H.F.Walker. Mixture densities, maximum likelihood and the EMalgorithm. SIAM Review, 26(2):195-234, 1984.
-
(1984)
SIAM Review
, vol.26
, Issue.2
, pp. 195-234
-
-
Redner, R.A.1
Walker, H.F.2
-
13
-
-
84892142402
-
Fraud detection in communications networks using neural and probabilistic methods
-
M.Taniguchi, M. Haft, J. Hollmén, and V. Tresp. Fraud detection in communications networks using neural and probabilistic methods. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98), Volume II, pp. 1241-1244, 1998.
-
(1998)
Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP'98)
, vol.2
, pp. 1241-1244
-
-
Taniguchi, M.1
Haft, M.2
Hollmén, J.3
Tresp, V.4
-
17
-
-
84880256343
-
-
WAP Forum. WAP-250-PushArchOverview-20010703-a, URL:
-
"WAP Push Architectural Overview"., WAP Forum., WAP-250-PushArchOverview-20010703-a, URL:http//www.wapforum.org/, 2001.07
-
(2001)
WAP Push Architectural Overview
, pp. 07
-
-
-
18
-
-
84880284223
-
-
WAP Forum., WAP-235-PushOTA-20010425-a., URL:
-
"Push OTA Protocol"., WAP Forum., WAP-235-PushOTA-20010425-a., URL:http//www.wapforum.org/, 2001.04
-
(2001)
Push OTA Protocol
, vol.4
-
-
|