-
1
-
-
10644275203
-
Embedded devices next on the virus target list
-
Piercy, C.: Embedded devices next on the virus target list. Electronic Systems and Software 2(6), 42–43 (2005)
-
(2005)
Electronic Systems and Software
, vol.2
, Issue.6
, pp. 42-43
-
-
Piercy, C.1
-
2
-
-
85025685537
-
World mobile anti-malware products markets
-
Frost, Sullivan: World mobile anti-malware products markets. Frost and Sullivan Report # M154-74 (2007)
-
(2007)
Frost and Sullivan Report #
, pp. M154-M174
-
-
Frost, S.1
-
3
-
-
84873722513
-
This is not the droid you’re looking for
-
Papathanasiou, C., Percoco, N.J.: This is not the droid you’re looking for. In: DEF CON 18 (2010)
-
(2010)
DEF CON
, vol.18
-
-
Papathanasiou, C.1
Percoco, N.J.2
-
4
-
-
85025686742
-
Predictions 2010: Enterprise Mobility Accelerates Again
-
Pelino, M.: Predictions 2010: Enterprise Mobility Accelerates Again. Forrester (2009)
-
(2009)
Forrester
-
-
Pelino, M.1
-
5
-
-
44649187943
-
Is It Finally Time to Worry about Mobile Malware?
-
Lawton, G.: Is It Finally Time to Worry about Mobile Malware? Computer 41(5), 12–14 (2008)
-
(2008)
Computer
, vol.41
, Issue.5
, pp. 12-14
-
-
Lawton, G.1
-
6
-
-
60049085302
-
Understanding Android Security
-
Enck, W., Ongtang, M., McDaniel, P.: Understanding Android Security. IEEE Security and Privacy 7(1), 50–57 (2009)
-
(2009)
IEEE Security and Privacy
, vol.7
, Issue.1
, pp. 50-57
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
8
-
-
77950675112
-
Google Android: A Comprehensive Security Assessment
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S., Glezer, C.: Google Android: A Comprehensive Security Assessment. IEEE Security and Privacy 8(2), 5–44 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.2
, pp. 5-44
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
Glezer, C.6
-
9
-
-
77955177819
-
-
CoRR abs/0912.5101
-
Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S.: Google Android: A State-of-the-Art Review of Security Mechanisms. CoRR abs/0912.5101 (2009)
-
(2009)
Google Android: A State-Of-The-Art Review of Security Mechanisms
-
-
Shabtai, A.1
Fledel, Y.2
Kanonov, U.3
Elovici, Y.4
Dolev, S.5
-
11
-
-
33750962703
-
Mobile Malware – New Avenues
-
Emm, D.: Mobile Malware – New Avenues. Network Security 2006(11), 4–6 (2006)
-
(2006)
Network Security
, vol.2006
, Issue.11
, pp. 4-6
-
-
Emm, D.1
-
13
-
-
77953137615
-
Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method
-
Shabtai, A., Kanonov, U., Elovici, Y.: Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method. Journal of Systems and Software 83(8), 1524–1537 (2010)
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.8
, pp. 1524-1537
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
-
14
-
-
84867714245
-
Applying Behavioral Detection on Android-Based Devices
-
Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.), Springer, Heidelberg
-
Shabtai, A., Elovici, Y.: Applying Behavioral Detection on Android-Based Devices. In: Cai, Y., Magedanz, T., Li, M., Xia, J., Giannelli, C. (eds.) Mobilware 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 48, pp. 235–249. Springer, Heidelberg (2010)
-
(2010)
Mobilware 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
, vol.48
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
15
-
-
77950673302
-
Securing Android-Powered Mobile Devices Using SELinux
-
Shabtai, A., Fledel, Y., Elovici, Y.: Securing Android-Powered Mobile Devices Using SELinux. IEEE Security and Privacy 8(3), 36–44 (2010)
-
(2010)
IEEE Security and Privacy
, vol.8
, Issue.3
, pp. 36-44
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
-
16
-
-
74349112208
-
DiffUser: Differentiated User Access Control on Smartphones
-
Ni, X., Yang, Z., Bai, X., Champion, A.C., Xuan, D.: DiffUser: Differentiated User Access Control on Smartphones. In: Proceedings of the 5th IEEE International Workshop on Wireless and Sensor Networks Security (2009)
-
(2009)
Proceedings of the 5Th IEEE International Workshop on Wireless and Sensor Networks Security
-
-
Ni, X.1
Yang, Z.2
Bai, X.3
Champion, A.C.4
Xuan, D.5
-
18
-
-
74049155830
-
On lightweight mobile phone application certification
-
Enck, W., Ongtang, M., McDaniel, P.: On lightweight mobile phone application certification. In: Proceedings of Computer and Communications Security Conference, pp. 235–245 (2009)
-
(2009)
Proceedings of Computer and Communications Security Conference
, pp. 235-245
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
19
-
-
77950851532
-
Semantically Rich Application-Centric Security in Android
-
Honolulu, Hawaii
-
Ongtang, M., McLaughlin, S., Enck, W., McDaniel, P.: Semantically Rich Application-Centric Security in Android. In: Proceedings of the 25th Annual Computer Security Applications Conference, Honolulu, Hawaii (2009)
-
(2009)
Proceedings of the 25Th Annual Computer Security Applications Conference
-
-
Ongtang, M.1
McLaughlin, S.2
Enck, W.3
McDaniel, P.4
-
20
-
-
79951646815
-
Automated Static Code Analysis for Classifying Android Applications Using Machine Learning
-
Nanning, China
-
Shabtai, A., Fledel, Y., Elovici, Y.: Automated Static Code Analysis for Classifying Android Applications Using Machine Learning. In: International Conference on Computational Intelligence and Security, Nanning, China (2010)
-
(2010)
International Conference on Computational Intelligence and Security
-
-
Shabtai, A.1
Fledel, Y.2
Elovici, Y.3
|