메뉴 건너뛰기




Volumn 2014-November, Issue November, 2014, Pages 71-80

Data model for android package information and its application to risk analysis system

Author keywords

Android package; APK; Data model; Information exchange; Information sharing; Risk analysis; Security alert

Indexed keywords

DATA STRUCTURES; INFORMATION ANALYSIS; RISK ANALYSIS; RISK ASSESSMENT; ROBOTS;

EID: 84937695881     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2663876.2663881     Document Type: Conference Paper
Times cited : (3)

References (28)
  • 3
    • 78651070465 scopus 로고    scopus 로고
    • The common vulnerability scoring system (CVSS) and its applicability to federal agency systems
    • P. Mell, K. Scarfone, and S. Romanosky. The Common Vulnerability Scoring System (CVSS) and Its Applicability to Federal Agency Systems. NIST Interagency Report 7435, 2007.
    • (2007) NIST Interagency Report 7435
    • Mell, P.1    Scarfone, K.2    Romanosky, S.3
  • 6
    • 84937693847 scopus 로고    scopus 로고
    • ITU-T. Language for the open definition of vulnerabilities and for the assessment of a system state. International telecommunications union, geneva, Switzerland
    • ITU-T. Language for the open definition of vulnerabilities and for the assessment of a system state. International Telecommunications Union, Geneva, Switzerland, 2014. ITU-T Recommendation X.1526.
    • (2014) ITU-T Recommendation X.1526
  • 9
    • 62349121390 scopus 로고    scopus 로고
    • Specification for the extensible configuration checklist description format (XCCDF) version 1.1.4
    • N. Ziring, and S. D. Quinn. Specification for the Extensible Configuration Checklist Description Format (XCCDF) version 1.1.4. NIST Interagency Report 7275 Revision 3, 2008.
    • (2008) NIST Interagency Report 7275 Revision 3
    • Ziring, N.1    Quinn, S.D.2
  • 11
    • 84937704779 scopus 로고    scopus 로고
    • IEEE ICSG malware metadata exchange format working group
    • IEEE ICSG Malware Metadata Exchange Format Working Group. Malware Metadata Exchange Format Version 1.2, 2014. http://grouper.ieee.org/groups/malware/malwg/Schema1.2/.
    • (2014) Malware Metadata Exchange Format Version 1.2
  • 12
    • 84937686404 scopus 로고    scopus 로고
    • The MITRE corporation
    • The MITRE Corporation. Making Security Measurable. http://msm.mitre.org/2014.
    • (2014) Making Security Measurable
  • 13
    • 84937717820 scopus 로고    scopus 로고
    • National institute of standards and technology
    • National Institute of Standards and Technology. National Vulnerability Database (NVD). http://nvd.nist.gov/2011.
    • (2011) National Vulnerability Database (NVD)
  • 15
    • 84937703814 scopus 로고    scopus 로고
    • Red hat inc
    • Red Hat Inc. Security Measurement. https://www.redhat.com/security/data/metrics/2014.
    • (2014) Security Measurement
  • 17
    • 79960858157 scopus 로고    scopus 로고
    • Resource description framework (RDF): Concepts and abstract syntax
    • G. Klyne, and J. J. Carroll. Resource Description Framework (RDF): Concepts and Abstract Syntax. The World Wide Web Consortium, 2004.
    • (2004) The World Wide Web Consortium
    • Klyne, G.1    Carroll, J.J.2
  • 18
    • 84961677194 scopus 로고    scopus 로고
    • Technical considerations for vetting 3rd party mobile applications (Draft)
    • Maryland, USA, NIST special publication
    • Voas J, Quirolgico S, Michael C, et al. Technical Considerations for Vetting 3rd Party Mobile Applications (Draft). National Institute of Standards and Technology, Maryland, USA, 2014. NIST special publication 800-163.
    • (2014) National Institute of Standards and Technology , pp. 163-800
    • Voas, J.1    Quirolgico, S.2    Michael, C.3
  • 21
    • 84937679887 scopus 로고    scopus 로고
    • NetAgent Co. Ltd. Secroid. http://secroid.jp, 2014.
    • (2014) NetAgent Co. Ltd


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.