-
1
-
-
84860619315
-
Reducing the window of opportunity for android malware gotta catch'em all
-
A. Apvrille and T. Strazzere. Reducing the window of opportunity for android malware gotta catch'em all. Journal in Computer Virology, 8(1-2):61-71, 2012.
-
(2012)
Journal in Computer Virology
, vol.8
, Issue.1-2
, pp. 61-71
-
-
Apvrille, A.1
Strazzere, T.2
-
2
-
-
84921058779
-
Malware detection using network trafic analysis in android based mobile devices
-
IEEE
-
A. Arora, S. Garg, and S. K. Peddoju. Malware detection using network trafic analysis in android based mobile devices. In Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on, pages 66-71. IEEE, 2014.
-
(2014)
Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth International Conference on
, pp. 66-71
-
-
Arora, A.1
Garg, S.2
Peddoju, S.K.3
-
3
-
-
84910658019
-
Drebin: Efficient and explainable detection of android malware in your pocket
-
D. Arp, M. Spreitzenbarth, M. Hubner, H. Gascon, and K. Rieck. Drebin: Efficient and explainable detection of android malware in your pocket. In Proc. of 17th Network and Distributed System Security Symposium, NDSS, volume 14.
-
Proc. of 17th Network and Distributed System Security Symposium, NDSS
, vol.14
-
-
Arp, D.1
Spreitzenbarth, M.2
Hubner, M.3
Gascon, H.4
Rieck, K.5
-
4
-
-
78651410113
-
An android application sandbox system for suspicious software detection
-
IEEE
-
T. Bläsing, L. Batyuk, A.-D. Schmidt, S. A. Camtepe, and S. Albayrak. An android application sandbox system for suspicious software detection. In Malicious and unwanted software (MALWARE), 2010 5th international conference on, pages 55-62. IEEE, 2010.
-
(2010)
Malicious and Unwanted Software (MALWARE), 2010 5th International Conference on
, pp. 55-62
-
-
Bläsing, T.1
Batyuk, L.2
Schmidt, A.-D.3
Camtepe, S.A.4
Albayrak, S.5
-
5
-
-
84901444070
-
Inferring malware family through application protocol sequences signature
-
IEEE
-
A. Boukhtouta, N.-E. Lakhdari, and M. Debbabi. Inferring malware family through application protocol sequences signature. In New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on, pages 1-5. IEEE, 2014.
-
(2014)
New Technologies, Mobility and Security (NTMS), 2014 6th International Conference on
, pp. 1-5
-
-
Boukhtouta, A.1
Lakhdari, N.-E.2
Debbabi, M.3
-
6
-
-
0035478854
-
Random forests
-
L. Breiman. Random forests. Machine learning, 45(1):5-32, 2001.
-
(2001)
Machine Learning
, vol.45
, Issue.1
, pp. 5-32
-
-
Breiman, L.1
-
7
-
-
84959302341
-
Detecting android malware using sequences of system calls
-
ACM
-
G. Canfora, E. Medvet, F. Mercaldo, and C. A. Visaggio. Detecting android malware using sequences of system calls. In Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile, pages 13-20. ACM, 2015.
-
(2015)
Proceedings of the 3rd International Workshop on Software Development Lifecycle for Mobile
, pp. 13-20
-
-
Canfora, G.1
Medvet, E.2
Mercaldo, F.3
Visaggio, C.A.4
-
8
-
-
84892410673
-
A classifier of malicious android applications
-
IEEE
-
G. Canfora, F. Mercaldo, and C. A. Visaggio. A classifier of malicious android applications. In Availability, Reliability and Security (ARES), 2013 Eighth International Conference on, pages 607-614. IEEE, 2013.
-
(2013)
Availability, Reliability and Security (ARES), 2013 Eighth International Conference on
, pp. 607-614
-
-
Canfora, G.1
Mercaldo, F.2
Visaggio, C.A.3
-
9
-
-
84954467594
-
Energy-aware performance evaluation of android custom kernels
-
IEEE Press
-
L. Corral, A. B. Georgiev, A. Janes, and S. Koer. Energy-aware performance evaluation of android custom kernels. In Proceedings of the Fourth International Workshop on Green and Sustainable Software, pages 1-7. IEEE Press, 2015.
-
(2015)
Proceedings of the Fourth International Workshop on Green and Sustainable Software
, pp. 1-7
-
-
Corral, L.1
Georgiev, A.B.2
Janes, A.3
Koer, S.4
-
10
-
-
84958545174
-
Detecting anomalies in embedded computing systems via a novel hmm-based machine learning approach
-
Springer
-
A. Cuzzocrea, E. Medvet, E. Mumolo, and R. Cecolin. Detecting anomalies in embedded computing systems via a novel hmm-based machine learning approach. In Hybrid Artificial Intelligent Systems, pages 405-415. Springer, 2015.
-
(2015)
Hybrid Artificial Intelligent Systems
, pp. 405-415
-
-
Cuzzocrea, A.1
Medvet, E.2
Mumolo, E.3
Cecolin, R.4
-
11
-
-
52049089485
-
A software tool to relate technical performance to user experience in a mobile context
-
IEEE
-
T. Deryckere, W. Joseph, L. Martens, L. De Marez, K. De Moor, and K. Berte. A software tool to relate technical performance to user experience in a mobile context. In World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on a, pages 1-6. IEEE, 2008.
-
(2008)
World of Wireless, Mobile and Multimedia Networks, 2008. WoWMoM 2008. 2008 International Symposium on A
, pp. 1-6
-
-
Deryckere, T.1
Joseph, W.2
Martens, L.3
De Marez, L.4
De Moor, K.5
Berte, K.6
-
12
-
-
80755181016
-
Location based power analysis to detect malicious code in smartphones
-
ACM
-
B. Dixon, Y. Jiang, A. Jaiantilal, and S. Mishra. Location based power analysis to detect malicious code in smartphones. In Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, pages 27-32. ACM, 2011.
-
(2011)
Proceedings of the 1st ACM Workshop on Security and Privacy in Smartphones and Mobile Devices
, pp. 27-32
-
-
Dixon, B.1
Jiang, Y.2
Jaiantilal, A.3
Mishra, S.4
-
13
-
-
84904095463
-
Taintdroid: An information-ow tracking system for realtime privacy monitoring on smartphones
-
W. Enck, P. Gilbert, S. Han, V. Tendulkar, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-ow tracking system for realtime privacy monitoring on smartphones. ACM Transactions on Computer Systems (TOCS), 32(2):5, 2014.
-
(2014)
ACM Transactions on Computer Systems (TOCS)
, vol.32
, Issue.2
, pp. 5
-
-
Enck, W.1
Gilbert, P.2
Han, S.3
Tendulkar, V.4
Chun, B.-G.5
Cox, L.P.6
Jung, J.7
McDaniel, P.8
Sheth, A.N.9
-
14
-
-
84864260968
-
Estimating android applications' cpu energy usage via bytecode profiling
-
IEEE Press
-
S. Hao, D. Li, W. G. Halfond, and R. Govindan. Estimating android applications' cpu energy usage via bytecode profiling. In Proceedings of the First International Workshop on Green and Sustainable Software, pages 1-7. IEEE Press, 2012.
-
(2012)
Proceedings of the First International Workshop on Green and Sustainable Software
, pp. 1-7
-
-
Hao, S.1
Li, D.2
Halfond, W.G.3
Govindan, R.4
-
15
-
-
57349195106
-
Detecting energy-greedy anomalies and mobile malware variants
-
ACM
-
H. Kim, J. Smith, and K. G. Shin. Detecting energy-greedy anomalies and mobile malware variants. In Proceedings of the 6th international conference on Mobile systems, applications, and services, pages 239-252. ACM, 2008.
-
(2008)
Proceedings of the 6th International Conference on Mobile Systems, Applications, and Services
, pp. 239-252
-
-
Kim, H.1
Smith, J.2
Shin, K.G.3
-
16
-
-
84921447157
-
Droidgraph: Discovering android malware by analyzing semantic behavior
-
IEEE
-
J. Kwon, J. Jeong, J. Lee, and H. Lee. Droidgraph: discovering android malware by analyzing semantic behavior. In Communications and Network Security (CNS), 2014 IEEE Conference on, pages 498-499. IEEE, 2014.
-
(2014)
Communications and Network Security (CNS), 2014 IEEE Conference on
, pp. 498-499
-
-
Kwon, J.1
Jeong, J.2
Lee, J.3
Lee, H.4
-
18
-
-
84912066856
-
Research of android malware detection based on network trafic monitoring
-
IEEE
-
J. Li, L. Zhai, X. Zhang, and D. Quan. Research of android malware detection based on network trafic monitoring. In Industrial Electronics and Applications (ICIEA), 2014 IEEE 9th Conference on, pages 1739-1744. IEEE, 2014.
-
(2014)
Industrial Electronics and Applications (ICIEA), 2014 IEEE 9th Conference on
, pp. 1739-1744
-
-
Li, J.1
Zhai, L.2
Zhang, X.3
Quan, D.4
-
20
-
-
76649138917
-
Virusmeter: Preventing your cellphone from spies
-
Springer
-
L. Liu, G. Yan, X. Zhang, and S. Chen. Virusmeter: Preventing your cellphone from spies. In Recent Advances in Intrusion Detection, pages 244-264. Springer, 2009.
-
(2009)
Recent Advances in Intrusion Detection
, pp. 244-264
-
-
Liu, L.1
Yan, G.2
Zhang, X.3
Chen, S.4
-
23
-
-
84950124903
-
Segugio: Efficient behavior-based tracking of malware-control domains in large ISP networks
-
IEEE
-
B. Rahbarinia, R. Perdisci, and M. Antonakakis. Segugio: Efficient behavior-based tracking of malware-control domains in large isp networks. In Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on, pages 403-414. IEEE, 2015.
-
(2015)
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on
, pp. 403-414
-
-
Rahbarinia, B.1
Perdisci, R.2
Antonakakis, M.3
-
25
-
-
77953137615
-
Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method
-
A. Shabtai, U. Kanonov, and Y. Elovici. Intrusion detection for mobile devices using the knowledge-based, temporal abstraction method. Journal of Systems and Software, 83(8):1524-1537, 2010.
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
26
-
-
84856225193
-
"andromaly": A behavioral malware detection framework for android devices
-
A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss. "andromaly": a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems, 38(1):161-190, 2012.
-
(2012)
Journal of Intelligent Information Systems
, vol.38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
28
-
-
84939128749
-
Mobilesandbox: Looking deeper into android applications
-
M. Spreitzenbarth, F. Echtler, T. Schrek, F. C. Freiling, and J. Hoffman. Mobilesandbox: looking deeper into android applications. In Proc. the 28th ACM Symposium on Applied Computing (SAC), 2013.
-
(2013)
Proc. The 28th ACM Symposium on Applied Computing (SAC)
-
-
Spreitzenbarth, M.1
Echtler, F.2
Schrek, T.3
Freiling, F.C.4
Hoffman, J.5
-
29
-
-
84886483650
-
Maximizing the user experience with energy-based fair sharing in battery limited mobile systems
-
J. Wei, E. Juarez, M. J. Garrido, and F. Pescador. Maximizing the user experience with energy-based fair sharing in battery limited mobile systems. Consumer Electronics, IEEE Transactions on, 59(3):690-698, 2013.
-
(2013)
Consumer Electronics IEEE Transactions on
, vol.59
, Issue.3
, pp. 690-698
-
-
Wei, J.1
Juarez, E.2
Garrido, M.J.3
Pescador, F.4
-
30
-
-
84868122250
-
Android malware detection via a latent network behavior analysis
-
IEEE
-
T.-E. Wei, C.-H. Mao, A. B. Jeng, H.-M. Lee, H.-T. Wang, and D.-J. Wu. Android malware detection via a latent network behavior analysis. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on, pages 1251-1258. IEEE, 2012.
-
(2012)
Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on
, pp. 1251-1258
-
-
Wei, T.-E.1
Mao, C.-H.2
Jeng, A.B.3
Lee, H.-M.4
Wang, H.-T.5
Wu, D.-J.6
|