메뉴 건너뛰기




Volumn 22, Issue 1, 2015, Pages 138-144

Mobile application security: Malware threats and defenses

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; MOBILE SECURITY; PERSONAL COMPUTING; SMARTPHONES;

EID: 84924860324     PISSN: 15361284     EISSN: None     Source Type: Journal    
DOI: 10.1109/MWC.2015.7054729     Document Type: Article
Times cited : (72)

References (15)
  • 3
    • 85067777645 scopus 로고    scopus 로고
    • 254,158 Android apps are 'malicious' as mobile malware skyrockets 614 percent, Juniper says June 26
    • "254,158 Android apps are 'malicious' as mobile malware skyrockets 614 percent, Juniper says," June 26, 2013, http://venturebeat.com/2013/06/26/254158-android-apps-are-malicious-as-mobile-malware-skyrock-ets-614/
    • (2013)
  • 5
    • 84880257901 scopus 로고    scopus 로고
    • A Behavior Analysis Based Mobile Malware Defense System
    • D. Guo, A. Sui, and T. Guo, "A Behavior Analysis Based Mobile Malware Defense System," Proc. ICSPCS, pp. 1-6, 2012.
    • (2012) Proc. ICSPCS , pp. 1-6
    • Guo, D.1    Sui, A.2    Guo, T.3
  • 7
    • 84897594353 scopus 로고    scopus 로고
    • Detecting Mobile Malware Threats to Homeland Security Through Static Analysis
    • Feb
    • S.-H. Seoa et al., "Detecting Mobile Malware Threats to Homeland Security Through Static Analysis," J. Network and Computer Applications, vol. 38, Feb. 2014, pp. 43-53.
    • (2014) J. Network and Computer Applications , vol.38 , pp. 43-53
    • Seoa, S.-H.1
  • 8
    • 84913590313 scopus 로고    scopus 로고
    • NFV: State of the Art, Challenges and Implementation in Next Generation Mobile Networks (vEPC)
    • Nov./Dec
    • H. Hawilo et al., "NFV: State of the Art, Challenges and Implementation in Next Generation Mobile Networks (vEPC)," IEEE Network, vol. 28, no. 6, Nov./Dec.2014, pp. 18-26.
    • (2014) IEEE Network , vol.28 , Issue.6 , pp. 18-26
    • Hawilo, H.1
  • 9
    • 84924912080 scopus 로고    scopus 로고
    • Term Survey paper, April
    • S. Ramu, "Mobile Malware Evolution, Detection and Defence," Term Survey paper, April 2012, http://blogs.ubc.ca/computersecurity/files/2012/04/SRamu-EECE572-SurveyPaper-SrikanthRamu.pdf.
    • (2012) Mobile Malware Evolution, Detection and Defence
    • Ramu, S.1
  • 10
    • 84923061366 scopus 로고    scopus 로고
    • AirBag: Boosting Smartphone Resistance to Malware Infection
    • C. Wu et al., "AirBag: Boosting Smartphone Resistance to Malware Infection," Proc. NDSS, 2014.
    • Proc. NDSS, 2014
    • Wu, C.1
  • 11
    • 84906218683 scopus 로고    scopus 로고
    • Mobile Malware Security Challeges and Cloud-Based Detection
    • N. Penning et al., "Mobile Malware Security Challeges and Cloud-Based Detection," Proc. CTS, 2014, pp. 181-88.
    • Proc. CTS, 2014 , pp. 181-188
    • Penning, N.1
  • 12
    • 84884907087 scopus 로고    scopus 로고
    • Secloud: A Cloud-Based Comprehensive and Lightweight Security Solution for Smartphones
    • Sept
    • S. Zonouz et al., "Secloud: A Cloud-Based Comprehensive and Lightweight Security Solution for Smartphones," Computers & Security, vol. 37, Sept. 2013, pp. 215-27.
    • (2013) Computers & Security , vol.37 , pp. 215-227
    • Zonouz, S.1
  • 14
    • 84871698137 scopus 로고    scopus 로고
    • What You See Predicts What You Get - Lightweight Agent-Based Malware Detection
    • Jan
    • W. Wang et al., "What You See Predicts What You Get - Lightweight Agent-Based Malware Detection," Security and Communication Networks, vol. 6, no. 1, Jan. 2013, pp. 33-48.
    • (2013) Security and Communication Networks , vol.6 , Issue.1 , pp. 33-48
    • Wang, W.1
  • 15
    • 84890742606 scopus 로고    scopus 로고
    • Analysis of Bayesian classification-based approaches for Android malware detection
    • Jan
    • S. Yerima, S. Sezer, and G. McWilliams, "Analysis of Bayesian classification-based approaches for Android malware detection," IET Information Security, vol. 8, no. 1, Jan. 2014, pp. 25-36.
    • (2014) IET Information Security , vol.8 , Issue.1 , pp. 25-36
    • Yerima, S.1    Sezer, S.2    McWilliams, G.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.