-
1
-
-
84893293430
-
-
Technical report, Symantec Corporation
-
Masaki Suenaga. Android.opfake in-depth. Technical report, Symantec Corporation, 2012.
-
(2012)
Android.opfake In-depth
-
-
Suenaga, M.1
-
3
-
-
65749099969
-
Detection of malicious code by applying machine learning classifiers on static features: A state-of-The-art survey
-
February
-
Asaf Shabtai, Robert Moskovitch, Yuval Elovici, and Chanan Glezer. Detection of malicious code by applying machine learning classifiers on static features: A state-of-The-art survey. Inf. Secur. Tech. Rep., 14(1):16-29, February 2009.
-
(2009)
Inf. Secur. Tech. Rep.
, vol.14
, Issue.1
, pp. 16-29
-
-
Shabtai, A.1
Moskovitch, R.2
Elovici, Y.3
Glezer, C.4
-
4
-
-
37849017546
-
Mining specifications of malicious behavior
-
New York, NY, USA, ACM
-
Mihai Christodorescu, Somesh Jha, and Christopher Kruegel. Mining specifications of malicious behavior. In Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering, ESEC-FSE '07, pages 5-14, New York, NY, USA, 2007. ACM.
-
(2007)
Proceedings of the the 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, ESEC-FSE '07
, pp. 5-14
-
-
Christodorescu, M.1
Jha, S.2
Kruegel, C.3
-
5
-
-
49949090311
-
Learning and classification of malware behavior
-
Berlin, Heidelberg, Springer-Verlag
-
Konrad Rieck, Thorsten Holz, Carsten Willems, Patrick Dussel, and Pavel Laskov. Learning and classification of malware behavior. In Proceedings of the 5th international conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08, pages 108-125, Berlin, Heidelberg, 2008. Springer-Verlag.
-
(2008)
Proceedings of the 5th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA '08
, pp. 108-125
-
-
Rieck, K.1
Holz, T.2
Willems, C.3
Dussel, P.4
Laskov, P.5
-
6
-
-
48649087530
-
Limits of static analysis for malware detection
-
Andreas Moser, Christopher Kruegel, and Engin Kirda. Limits of static analysis for malware detection. In ACSAC, pages 421-430, 2007.
-
(2007)
ACSAC
, pp. 421-430
-
-
Moser, A.1
Kruegel, C.2
Kirda, E.3
-
7
-
-
51449120796
-
Mobile device profiling and intrusion detection using smart batteries
-
Washington, DC, USA,. IEEE Computer Society
-
Timothy K. Buennemeyer, Theresa M. Nelson, Lee M. Clagett, John P. Dunning, Randy C. Marchany, and Joseph G. Tront. Mobile device profiling and intrusion detection using smart batteries. In Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, HICSS '08, pages 296-, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
Proceedings of the Proceedings of the 41st Annual Hawaii International Conference on System Sciences, HICSS '08
-
-
Buennemeyer, T.K.1
Nelson, T.M.2
Clagett, L.M.3
Dunning, J.P.4
Marchany, R.C.5
Tront, J.G.6
-
8
-
-
84867833971
-
Enhancing security of linux-based android devices
-
Lehmann, October
-
Aubrey-Derrick Schmidt, Hans-Gunther Schmidt, Jan Clausen, Kamer Ali Yuksel, Osman Kiraz, Ahmet Camtepe, and Sahin Albayrak. Enhancing security of linux-based android devices. In in Proceedings of 15th International Linux Kongress. Lehmann, October 2008.
-
(2008)
Proceedings of 15th International Linux Kongress
-
-
Schmidt, A.-D.1
Schmidt, H.-G.2
Clausen, J.3
Ali Yuksel, K.4
Kiraz, O.5
Camtepe, A.6
Albayrak, S.7
-
9
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA. USENIX Association
-
William Enck, Peter Gilbert, Byung-Gon Chun, Landon P. Cox, Jaeyeon Jung, Patrick McDaniel, and Anmol N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
10
-
-
77953137615
-
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
-
August
-
Asaf Shabtai, Uri Kanonov, and Yuval Elovici. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. J. Syst. Softw., 83(8):1524-1537, August 2010.
-
(2010)
J. Syst. Softw.
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
11
-
-
80755143401
-
Crowdroid: Behavior-based malware detection system for Android
-
New York, NY, USA, October. ACM
-
Iker Burguera, Urko Zurutuza, and Simin N. Tehrani. Crowdroid: behavior-based malware detection system for Android. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11, pages 15-26, New York, NY, USA, October 2011. ACM.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, SPSM '11
, pp. 15-26
-
-
Burguera, I.1
Zurutuza, U.2
Tehrani, S.N.3
-
12
-
-
0032680362
-
A fast algorithm for the minimum covariance determinant estimator
-
August
-
Peter J. Rousseeuw and Katrien Van Driessen. A fast algorithm for the minimum covariance determinant estimator. Technometrics, 41:212-223, August 1999.
-
(1999)
Technometrics
, vol.41
, pp. 212-223
-
-
Rousseeuw, P.J.1
Van Driessen, K.2
|