-
3
-
-
84875220371
-
The mobile fitness coach: Towards individualized skill assessment using personalized mobile devices
-
Special Section: Mobile Interactions with the Real World
-
M. Kranz, A. Möller, N. Hammerla, S. Diewald, T. Plötz, P. Olivier, and L. Roalter The mobile fitness coach: towards individualized skill assessment using personalized mobile devices Pervasive Mob. Comput. 9 2013 203 215 Special Section: Mobile Interactions with the Real World
-
(2013)
Pervasive Mob. Comput.
, vol.9
, pp. 203-215
-
-
Kranz, M.1
Möller, A.2
Hammerla, N.3
Diewald, S.4
Plötz, T.5
Olivier, P.6
Roalter, L.7
-
4
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
G. Suarez-Tangil, J.E. Tapiador, P. Peris, and A. Ribagorda Evolution, detection and analysis of malware for smart devices IEEE Commun. Surv. Tutor. 2013 1 27 10.1109/SURV.2013.101613.00077
-
(2013)
IEEE Commun. Surv. Tutor.
, pp. 1-27
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris, P.3
Ribagorda, A.4
-
7
-
-
57849130705
-
Anomaly-based network intrusion detection: Techniques, systems and challenges
-
P. Garcia-Teodoro, J.E. Díaz-Verdejo, G. Maciá-Fernández, and E. Vázquez Anomaly-based network intrusion detection: techniques, systems and challenges Comput. Secur. 28 2009 18 28
-
(2009)
Comput. Secur.
, vol.28
, pp. 18-28
-
-
Garcia-Teodoro, P.1
Díaz-Verdejo, J.E.2
MacIá-Fernández, G.3
Vázquez, E.4
-
8
-
-
84856225193
-
"andromaly": A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss "Andromaly": a behavioral malware detection framework for android devices Journal of Intelligent Information Systems 38 2012 161 190
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
9
-
-
84891893424
-
A study of machine learning classifiers for anomaly-based mobile botnet detection
-
A. Feizollah, N.B. Anuar, R. Salleh, F. Amalina, R.R. Ma'arof, and S. Shamshirband A study of machine learning classifiers for anomaly-based mobile botnet detection Malaysian J. Comput. Sci. 26 2014
-
(2014)
Malaysian J. Comput. Sci.
, vol.26
-
-
Feizollah, A.1
Anuar, N.B.2
Salleh, R.3
Amalina, F.4
Ma'Arof, R.R.5
Shamshirband, S.6
-
11
-
-
84872224783
-
Madam: A multi-level anomaly detector for android malware
-
Springer-Verlag
-
G. Dini, F. Martinelli, A. Saracino, and D. Sgandurra Madam: a multi-level anomaly detector for android malware Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security 2012 Springer-Verlag 240 253
-
(2012)
Proceedings of the 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security: Computer Network Security
, pp. 240-253
-
-
Dini, G.1
Martinelli, F.2
Saracino, A.3
Sgandurra, D.4
-
14
-
-
85037074313
-
Implicit authentication through learning user behavior
-
Springer
-
E. Shi, Y. Niu, M. Jakobsson, and R. Chow Implicit authentication through learning user behavior Information Security 2011 Springer 99 113
-
(2011)
Information Security
, pp. 99-113
-
-
Shi, E.1
Niu, Y.2
Jakobsson, M.3
Chow, R.4
-
15
-
-
84862067265
-
Touch me once and i know it's you!: Implicit authentication based on touch screen patterns
-
ACM
-
A. De Luca, A. Hang, F. Brudy, C. Lindner, and H. Hussmann Touch me once and i know it's you!: implicit authentication based on touch screen patterns Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems 2012 ACM 987 996
-
(2012)
Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems
, pp. 987-996
-
-
De Luca, A.1
Hang, A.2
Brudy, F.3
Lindner, C.4
Hussmann, H.5
-
16
-
-
78751498804
-
Paranoid android: Versatile protection for smartphones
-
G. Portokalidis, P. Homburg, K. Anagnostakis, H. Bos, Paranoid android: versatile protection for smartphones, in: Proceedings of the 26th Annual Computer Security Applications Conference, 2010, pp. 347-356.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference
, pp. 347-356
-
-
Portokalidis, G.1
Homburg, P.2
Anagnostakis, K.3
Bos, H.4
-
18
-
-
84873148214
-
Application mobility in pervasive computing: A survey
-
Special Section: Pervasive Sustainability
-
P. Yu, X. Ma, J. Cao, and J. Lu Application mobility in pervasive computing: a survey Pervasive Mob. Comput. 9 2013 2 17 Special Section: Pervasive Sustainability
-
(2013)
Pervasive Mob. Comput.
, vol.9
, pp. 2-17
-
-
Yu, P.1
Ma, X.2
Cao, J.3
Lu, J.4
-
19
-
-
84892975989
-
Smartphone sensing offloading for efficiently supporting social sensing applications
-
Selected Papers from the Eleventh Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2013)
-
K.K. Rachuri, C. Efstratiou, I. Leontiadis, C. Mascolo, and P.J. Rentfrow Smartphone sensing offloading for efficiently supporting social sensing applications Pervasive Mob. Comput. 10 Part A 2014 3 21 Selected Papers from the Eleventh Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2013)
-
(2014)
Pervasive Mob. Comput.
, vol.10
, Issue.PART A
, pp. 3-21
-
-
Rachuri, K.K.1
Efstratiou, C.2
Leontiadis, I.3
Mascolo, C.4
Rentfrow, P.J.5
-
20
-
-
33744584654
-
Induction of decision trees
-
J.R. Quinlan Induction of decision trees Mach. Learn. 1 1986 81 106
-
(1986)
Mach. Learn.
, vol.1
, pp. 81-106
-
-
Quinlan, J.R.1
-
21
-
-
0343442766
-
Knowledge acquisition via incremental conceptual clustering
-
D.H. Fisher Knowledge acquisition via incremental conceptual clustering Mach. Learn. 2 1987 139 172
-
(1987)
Mach. Learn.
, vol.2
, pp. 139-172
-
-
Fisher, D.H.1
-
22
-
-
85161148381
-
The elements of statistical learning: Data mining, inference and prediction
-
T. Hastie, R. Tibshirani, J. Friedman, and J. Franklin The elements of statistical learning: data mining, inference and prediction Math. Intelligencer 27 2005 83 85
-
(2005)
Math. Intelligencer
, vol.27
, pp. 83-85
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.3
Franklin, J.4
-
23
-
-
85077120667
-
Appscope: Application energy metering framework for android smartphone using kernel activity monitoring
-
C. Yoon, D. Kim, W. Jung, C. Kang, H. Cha, Appscope: application energy metering framework for android smartphone using kernel activity monitoring, in: USENIX Annual Technical Conference, 2012.
-
(2012)
USENIX Annual Technical Conference
-
-
Yoon, C.1
Kim, D.2
Jung, W.3
Kang, C.4
Cha, H.5
-
24
-
-
84869015294
-
Devscope: A nonintrusive and online power analysis tool for smartphone hardware components
-
ACM
-
W. Jung, C. Kang, C. Yoon, D. Kim, and H. Cha Devscope: a nonintrusive and online power analysis tool for smartphone hardware components Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis 2012 ACM 353 362
-
(2012)
Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, pp. 353-362
-
-
Jung, W.1
Kang, C.2
Yoon, C.3
Kim, D.4
Cha, H.5
-
25
-
-
76749092270
-
The weka data mining software: An update
-
M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I.H. Witten The weka data mining software: an update ACM SIGKDD Exploration Newsletter 11 2009 10 18
-
(2009)
ACM SIGKDD Exploration Newsletter
, vol.11
, pp. 10-18
-
-
Hall, M.1
Frank, E.2
Holmes, G.3
Pfahringer, B.4
Reutemann, P.5
Witten, I.H.6
-
26
-
-
79955951954
-
Clonecloud: Elastic execution between mobile device and cloud
-
B.G. Chun, S. Ihm, P. Maniatis, M. Naik, A. Patti, Clonecloud: elastic execution between mobile device and cloud, in: Proceedings of the Sixth Conference on Computer Systems, 2011, pp. 301-314.
-
(2011)
Proceedings of the Sixth Conference on Computer Systems
, pp. 301-314
-
-
Chun, B.G.1
Ihm, S.2
Maniatis, P.3
Naik, M.4
Patti, A.5
-
27
-
-
79960862322
-
Secure and practical outsourcing of linear programming in cloud computing
-
C. Wang, K. Ren, J. Wang, Secure and practical outsourcing of linear programming in cloud computing, in: Proceedings of INFOCOMM 2011, 2011, pp. 820-828.
-
(2011)
Proceedings of INFOCOMM 2011
, pp. 820-828
-
-
Wang, C.1
Ren, K.2
Wang, J.3
-
28
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
MALWARE 2010 IEEE
-
T. Blasing, L. Batyuk, A. Schmidt, S. Camtepe, and S. Albayrak An android application sandbox system for suspicious software detection 5th International Conference on Malicious and Unwanted Software MALWARE 2010 2010 IEEE 55 62
-
(2010)
5th International Conference on Malicious and Unwanted Software
, pp. 55-62
-
-
Blasing, T.1
Batyuk, L.2
Schmidt, A.3
Camtepe, S.4
Albayrak, S.5
-
29
-
-
84888862842
-
Identifying android malicious repackaged applications by thread-grained system call sequences
-
Y.D. Lin, Y.C. Lai, C.H. Chen, and H.C. Tsai Identifying android malicious repackaged applications by thread-grained system call sequences Comput. Secur. 39 Part B 2013 340 350
-
(2013)
Comput. Secur.
, vol.39
, Issue.PART B
, pp. 340-350
-
-
Lin, Y.D.1
Lai, Y.C.2
Chen, C.H.3
Tsai, H.C.4
-
31
-
-
84883128081
-
To offload or not to offload? the bandwidth and energy costs of mobile cloud computing
-
M.V. Barbera, S. Kosta, A. Mei, J. Stefa, To offload or not to offload? the bandwidth and energy costs of mobile cloud computing, in: Proc. of IEEE INFOCOM, 2013, pp. 1285-1293.
-
(2013)
Proc. of IEEE INFOCOM
, pp. 1285-1293
-
-
Barbera, M.V.1
Kosta, S.2
Mei, A.3
Stefa, J.4
-
32
-
-
77951039985
-
Cloud computing for mobile users: Can offloading computation save energy?
-
K. Kumar, and Y.H. Lu Cloud computing for mobile users: can offloading computation save energy? Computer 43 2010 51 56
-
(2010)
Computer
, vol.43
, pp. 51-56
-
-
Kumar, K.1
Lu, Y.H.2
-
33
-
-
84866386301
-
To cloud or not to cloud: A mobile device perspective on energy consumption of applications
-
V. Namboodiri, T. Ghose, To cloud or not to cloud: A mobile device perspective on energy consumption of applications, in: IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks, WoWMoM, 2012, pp. 1-9.
-
(2012)
IEEE International Symposium on A World of Wireless, Mobile and Multimedia Networks, WoWMoM
, pp. 1-9
-
-
Namboodiri, V.1
Ghose, T.2
-
34
-
-
84887861085
-
Cloud computing in smartphone: Is offloading a better-bet?
-
Wichita State University, Tech. Rep. TR-EECS-WSU-2012-002
-
M.H. Tandel, V.S. Venkitachalam, Cloud computing in smartphone: is offloading a better-bet? Electrical Engineering and Computer Science, Wichita State University, Tech. Rep. TR-EECS-WSU-2012-002, 2012.
-
(2012)
Electrical Engineering and Computer Science
-
-
Tandel, M.H.1
Venkitachalam, V.S.2
-
35
-
-
78650632079
-
Accurate online power estimation and automatic battery behavior based power model generation for smartphones
-
ACM
-
L. Zhang, B. Tiwana, Z. Qian, Z. Wang, R. Dick, Z. Mao, and L. Yang Accurate online power estimation and automatic battery behavior based power model generation for smartphones Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis 2010 ACM 105 114
-
(2010)
Proceedings of the Eighth IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis
, pp. 105-114
-
-
Zhang, L.1
Tiwana, B.2
Qian, Z.3
Wang, Z.4
Dick, R.5
Mao, Z.6
Yang, L.7
-
36
-
-
84926408586
-
-
Accessed February 2014
-
H. Dediu, Systemtap. https://sourceware.org/systemtap/ (Accessed February 2014).
-
Systemtap
-
-
Dediu, H.1
-
38
-
-
79955955270
-
Fine-grained power modeling for smartphones using system call tracing
-
ACM
-
A. Pathak, Y. Hu, M. Zhang, P. Bahl, and Y. Wang Fine-grained power modeling for smartphones using system call tracing Proceedings of the Sixth Conference on Computer Systems 2011 ACM 153 168
-
(2011)
Proceedings of the Sixth Conference on Computer Systems
, pp. 153-168
-
-
Pathak, A.1
Hu, Y.2
Zhang, M.3
Bahl, P.4
Wang, Y.5
-
41
-
-
84864260968
-
Estimating android applications' cpu energy usage via bytecode profiling
-
IEEE
-
S. Hao, D. Li, W. Halfond, and R. Govindan Estimating android applications' cpu energy usage via bytecode profiling 2012 First International Workshop on Green and Sustainable Software, GREENS 2012 IEEE 1 7
-
(2012)
2012 First International Workshop on Green and Sustainable Software, GREENS
, pp. 1-7
-
-
Hao, S.1
Li, D.2
Halfond, W.3
Govindan, R.4
-
42
-
-
80255136670
-
Looking ahead in pervasive computing: Challenges and opportunities in the era of cyberphysical convergence
-
M. Conti, S.K. Das, C. Bisdikian, M. Kumar, L.M. Ni, A. Passarella, G. Roussos, G. Tröster, G. Tsudik, and F. Zambonelli Looking ahead in pervasive computing: Challenges and opportunities in the era of cyberphysical convergence Pervasive Mob. Comput. 8 2012 2 21
-
(2012)
Pervasive Mob. Comput.
, vol.8
, pp. 2-21
-
-
Conti, M.1
Das, S.K.2
Bisdikian, C.3
Kumar, M.4
Ni, L.M.5
Passarella, A.6
Roussos, G.7
Tröster, G.8
Tsudik, G.9
Zambonelli, F.10
|