메뉴 건너뛰기




Volumn , Issue , 2012, Pages

A behavior analysis based Mobile Malware Defense System

Author keywords

Malware; MMS; Mobile; Smartphone; SMS; Threats; Trojan

Indexed keywords

MALWARES; MMS; MOBILE; SMS; THREATS; TROJANS;

EID: 84880257901     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICSPCS.2012.6507944     Document Type: Conference Paper
Times cited : (8)

References (18)
  • 1
    • 84881570605 scopus 로고    scopus 로고
    • AnsonAlex.com,Accessed
    • AnsonAlex.com, Smartphone Usage Statistics 2012 , Accessed 2012, http://ansonalex.com/infographics/Smartphone-usage-statistics-2012-infographic/
    • (2012) Smartphone Usage Statistics 2012
  • 2
    • 84880283124 scopus 로고    scopus 로고
    • Accessed
    • AppBrain, Accessed 2012, http://www.appbrain.com/stats/number-ofandroid- apps
    • (2012) AppBrain
  • 3
    • 84866720156 scopus 로고    scopus 로고
    • Juniper Networks, Inc. Accessed
    • Juniper Networks, Inc., 2011 Mobile Threats Report , Accessed 2012, https://www.juniper.net/us/en/local/pdf/additional-resources/ jnpr-2011-mobile-threats-report.pdf
    • (2012) 2011 Mobile Threats Report
  • 4
    • 84880267677 scopus 로고    scopus 로고
    • Trend micro
    • Accessed
    • Trend Micro, The true face of the Android threat , Accessed 2012. http://www.trendmicro.co.uk/newsroom/pr/the-true-face-of- The-androidthreat/
    • (2012) The True Face of the Android Threat
  • 5
    • 80051969895 scopus 로고    scopus 로고
    • Mobile security catching up? revealing the nuts and bolts of the security of mobile devices
    • 2011 IEEE Symposium on 22-25 May
    • M. Becher, F.C. Freiling, J. Hoffmann,; T. Holz, S. Uellenbeck, C. Wolf, "Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices," Security and Privacy (SP), 2011 IEEE Symposium on , vol., no., pp.96-111, 22-25 May 2011
    • (2011) Security and Privacy (SP , pp. 96-111
    • Becher, M.1    Freiling, F.C.2    Hoffmann, J.3    Holz, T.4    Uellenbeck, S.5    Wolf, C.6
  • 7
    • 67650803219 scopus 로고    scopus 로고
    • An analysis of the iKee.B (Duh) iPhone botnet
    • SRI International, Dec.
    • P. Porras, H. Saidi, and V. Yegneswaran. An analysis of the iKee.B (Duh) iPhone botnet. Technical report, SRI International, Dec. 2009.
    • (2009) Technical Report
    • Porras, P.1    Saidi, H.2    Yegneswaran, V.3
  • 8
    • 84855742413 scopus 로고    scopus 로고
    • InfoSecurity.com. May
    • InfoSecurity.com. Premium rate calling Android malware spotted in the wild, May 2011. http://www.infosecurity-us.com/view/18301/premiumrate-calling- android-malware-spotted-in- The-wild/.
    • (2011) Premium Rate Calling Android Malware Spotted in the Wild
  • 12
    • 0021404166 scopus 로고
    • Mixture densities, maximum likelihood and the EMalgorithm
    • R.A. Redner and H.F.Walker. Mixture densities, maximum likelihood and the EMalgorithm. SIAM Review, 26(2):195-234, 1984.
    • (1984) SIAM Review , vol.26 , Issue.2 , pp. 195-234
    • Redner, R.A.1    Walker, H.F.2
  • 17
    • 84880256343 scopus 로고    scopus 로고
    • WAP Forum. WAP-250-PushArchOverview-20010703-a, URL:
    • "WAP Push Architectural Overview"., WAP Forum., WAP-250-PushArchOverview-20010703-a, URL:http//www.wapforum.org/, 2001.07
    • (2001) WAP Push Architectural Overview , pp. 07
  • 18
    • 84880284223 scopus 로고    scopus 로고
    • WAP Forum., WAP-235-PushOTA-20010425-a., URL:
    • "Push OTA Protocol"., WAP Forum., WAP-235-PushOTA-20010425-a., URL:http//www.wapforum.org/, 2001.04
    • (2001) Push OTA Protocol , vol.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.