-
3
-
-
84904213713
-
-
(last visited in February 2014)
-
The Open Vulnerability and Assessment Language (OVAL), http://oval.mitre.org/ (last visited in February 2014)
-
-
-
-
4
-
-
84894415690
-
A Probabilistic Cost-efficient Approach for Mobile Security Assessment
-
Barrère, M., Hurel, G., Badonnel, R., Festor, O.: A Probabilistic Cost-efficient Approach for Mobile Security Assessment. In: Proceedings of the 9th IFIP/IEEE International Conference on Network and Service Management, CNSM 2013 (2013)
-
(2013)
Proceedings of the 9th IFIP/IEEE International Conference on Network and Service Management, CNSM 2013
-
-
Barrère, M.1
Hurel, G.2
Badonnel, R.3
Festor, O.4
-
5
-
-
84883468371
-
Ovaldroid: An OVAL-based vulnerability assessment framework for Android
-
Barrère, M., Hurel, G., Badonnel, R., Festor, O.: Ovaldroid: An OVAL-based vulnerability assessment framework for Android. In: Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 1074-1075 (2013)
-
(2013)
Proceedings of the 13th IFIP/IEEE International Symposium on Integrated Network Management (IM 2013)
, pp. 1074-1075
-
-
Barrère, M.1
Hurel, G.2
Badonnel, R.3
Festor, O.4
-
7
-
-
84868120043
-
WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS
-
Kilinc, C., Booth, T., Andersson, K.: WallDroid: Cloud Assisted Virtualized Application Specific Firewalls for the Android OS. In: Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012), pp. 877-883 (2012)
-
(2012)
Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2012)
, pp. 877-883
-
-
Kilinc, C.1
Booth, T.2
Andersson, K.3
-
8
-
-
84864208383
-
Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure
-
Kim, T., Choi, Y., Han, S., Chung, J.Y., Hyun, J., Li, J., Hong, J.W.: Monitoring and Detecting Abnormal Behavior in Mobile Cloud Infrastructure. In: Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012), pp. 1303-1310 (2012)
-
(2012)
Proceedings of the 12th IEEE/IFIP Network Operations and Management Symposium (NOMS 2012)
, pp. 1303-1310
-
-
Kim, T.1
Choi, Y.2
Han, S.3
Chung, J.Y.4
Hyun, J.5
Li, J.6
Hong, J.W.7
-
9
-
-
84873374971
-
Mobile security: A look ahead
-
Li, Q., Clark, G.: Mobile security: A look ahead. IEEE Security and Privacy 11(1), 78-81 (2013)
-
(2013)
IEEE Security and Privacy
, vol.11
, Issue.1
, pp. 78-81
-
-
Li, Q.1
Clark, G.2
-
10
-
-
77956609298
-
Virtualized In-Cloud Security Services for Mobile Devices
-
Oberheide, J., Veeraraghavan, K., Cooke, E., Flinn, J., Jahanian, F.: Virtualized In-Cloud Security Services for Mobile Devices. In: Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt 2008), pp. 31-35 (2008)
-
(2008)
Proceedings of the 1st Workshop on Virtualization in Mobile Computing (MobiVirt 2008)
, pp. 31-35
-
-
Oberheide, J.1
Veeraraghavan, K.2
Cooke, E.3
Flinn, J.4
Jahanian, F.5
-
11
-
-
84930154133
-
Adventures in BouncerLand: Failures of Automated Malware Detection within Mobile ApplicationMarkets
-
(last visited in February 2014)
-
Percoco, N., Schulte, S.: Adventures in BouncerLand: Failures of Automated Malware Detection within Mobile ApplicationMarkets. In: Black Hat USA 2012 (2012), http://media.blackhat.com/ (last visited in February 2014)
-
(2012)
Black Hat USA 2012
-
-
Percoco, N.1
Schulte, S.2
-
12
-
-
78751498804
-
Paranoid Android: Versatile Protection for Smartphones
-
Portokalidis, G., Homburg, P., Anagnostakis, K., Bos, H.: Paranoid Android: Versatile Protection for Smartphones. In: Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010), pp. 347-356 (2010)
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC 2010)
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
13
-
-
84894550652
-
Making Middleboxes Someone else's Problem: Network Processing As a Cloud Service
-
ACM
-
Sherry, J., Hasan, S., Scott, C., Krishnamurthy, A., Ratnasamy, S., Sekar, V.: Making Middleboxes Someone else's Problem: Network Processing As a Cloud Service. In: Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pp. 13-24. ACM (2012)
-
(2012)
Proceedings of the ACM SIGCOMM 2012 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 13-24
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
|