-
1
-
-
84881248618
-
-
InternationalTelecommunicationsUnion (ITU)Updated December 2013. [Online] Retrieved on December 2013 from
-
InternationalTelecommunicationsUnion (ITU) , The World in 2013: ICT Facts and Figures. Updated December 2013. [Online] Retrieved on December 2013 from http://www.itu.int/en/ITUD/ Statistics/Pages/stat/default.aspx.
-
The World in 2013: ICT Facts and Figures
-
-
-
2
-
-
84926471512
-
-
Overall statistics for 2013 Securelist online] Retrieved on December
-
Christian Funk and Maria Garnaeva, "Kaspersky Security Bulletin 2013. Overall statistics for 2013", (Securelist), [online] Retrieved on December 2013 http://www.securelist.com/en/analysis/204792318/Kaspersky- Security- Bulletin-2013-Overall-statistics-for-2013
-
(2013)
Kaspersky Security Bulletin 2013
-
-
Funk, C.1
Garnaeva, M.2
-
3
-
-
84873712223
-
A survey on security for mobile devices
-
First Quarter doi: 10.1109/SURV.2012.013012.00028
-
La Polla, M.; Martinelli, F.; Sgandurra, D., "A Survey on Security for Mobile Devices," Communications Surveys & Tutorials, IEEE , vol.15, no.1, pp.446,471, First Quarter 2013 doi: 10.1109/SURV.2012.013012.00028
-
(2013)
Communications Surveys & Tutorials IEEE
, vol.15
, Issue.1
, pp. 446-471
-
-
La Polla, M.1
Martinelli, F.2
Sgandurra, D.3
-
4
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Shabtai, Asaf, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. ""Andromaly": a behavioral malware detection framework for android devices."Journal of Intelligent Information Systems 38, no. 1 (2012): 161-190.
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Asaf, S.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Yael, W.5
-
5
-
-
84904476574
-
Malware analysis: An introduction
-
online] Retrieve on July 2013 from
-
Distler, Dennis, "Malware Analysis: An Introduction", SANS Institute InfoSec Reading Room. [online] Retrieve on July 2013 from https://www.sans.org/reading-room/whitepapers/malicious/malwareanalysis- introduction-2103
-
SANS Institute InfoSec Reading Room
-
-
Dennis, D.1
-
6
-
-
84904476575
-
-
Retrieved on January 2014 [online]
-
Android System Call, Retrieved on January 2014 [online]https://github. com/android/platform-bionic/blob/master/libc/SY SCALLS.TXT
-
Android System Call
-
-
-
8
-
-
84856551625
-
Kernel-based behavior analysis for android malware detection
-
Seventh International Conference on , vol., no.3-4 Dec doi: 10.1109/CIS.2011.226
-
Isohara, T.; Takemori, K.; Kubota, A., "Kernel-based Behavior Analysis for Android Malware Detection," Computational Intelligence and Security (CIS), 2011 Seventh International Conference on , vol., no., pp.1011,1015, 3-4 Dec. 2011 doi: 10.1109/CIS.2011.226
-
(2011)
Computational Intelligence and Security (CIS)
, pp. 1011-1015
-
-
Isohara, T.1
Takemori, K.2
Kubota, A.3
-
9
-
-
84961614386
-
Automated malware detection for android AMDA
-
The Society of Digital Information and Wireless Communication 2013
-
Abela, Kevin Joshua, Jan Raynier Delas Alas, Don Kristopher Angeles, Robert Joseph Tolentino, and Miguel Alberto Gomez. "Automated Malware Detection for Android AMDA." In The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013), pp. 180-188. The Society of Digital Information and Wireless Communication, 2013.
-
(2013)
The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec
, pp. 180-188
-
-
Kevin Joshua, A.1
Raynier Delas Alas, J.2
Kristopher Angeles, D.3
Joseph Tolentino, R.4
Alberto Gomez, M.5
-
10
-
-
84872224783
-
MADAM: A multi-level anomaly detector for android malware
-
Springer Berlin Heidelberg
-
Dini, Gianluca, Fabio Martinelli, Andrea Saracino, and Daniele Sgandurra. "MADAM: a multi-level anomaly detector for android malware." In Computer Network Security, pp. 240-253. Springer Berlin Heidelberg, 2012.
-
(2012)
Computer Network Security
, pp. 240-253
-
-
Dini1
Gianluca2
Martinelli, F.3
Saracino, A.4
Sgandurra, D.5
-
13
-
-
84856043672
-
The mathematical theory of communication
-
Shannon, C. E, "The mathematical theory of communication", The Bell system Technical Journal, 27(3), 379-423, 1948.
-
(1948)
The Bell System Technical Journal
, vol.27
, Issue.3
, pp. 379-423
-
-
Shannon, C.E.1
-
14
-
-
84891893424
-
A study of machine learning classifiers for anomaly-based mobile botnet detection
-
Feizollah, Ali, Nor Badrul Anuar, Rosli Salleh, Fairuz Amalina, Ra'uf Ridzuan Ma'arof, and Shahaboddin Shamshirband. "A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection." Malaysian Journal of Computer Science 26, no. 4 , 2014.
-
(2014)
Malaysian Journal of Computer Science
, vol.26
, Issue.4
-
-
Ali, F.1
Badrul Anuar, N.2
Salleh, R.3
Amalina, F.4
Ridzuan Ma'Arof, R.5
Shamshirband, S.6
-
16
-
-
84887808078
-
Instance-based Anomaly Method for Android Malware Detection
-
Reykjavik (Iceland 29-31 July, ISBN: 978-989-8565-73-0
-
B. Sanz, I. Santos, X. Ugarte-Pedrero, C. Laorden, J. Nieves, y P.G. Bringas Instance-based Anomaly Method for Android Malware Detection. En Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT). Reykjavik (Iceland), 29-31 July 2013, pp. 387-394, ISBN: 978-989-8565-73-0
-
(2013)
Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT)
, pp. 387-394
-
-
Sanz, B.1
Santos, I.2
Ugarte-Pedrero, X.3
Laorden, C.4
Nieves, J.5
Bringas, P.G.6
-
17
-
-
78751615004
-
Analysis of machine learning techniques used in behavior-based malware detection
-
Firdausi, Ivan, Charles Lim, Alva Erwin, and Anto Satriyo Nugroho. "Analysis of machine learning techniques used in behavior-based malware detection." In Advances in Computing, Control and Telecommunication Technologies (ACT), 2010 Second International Conference on, pp. 201-203. IEEE, 2010.
-
(2010)
Advances in Computing, Control and Telecommunication Technologies (ACT) 2010 Second International Conference on IEEE
, pp. 201-203
-
-
Ivan, F.1
Lim, C.2
Erwin, A.3
Satriyo Nugroho, A.4
|