메뉴 건너뛰기




Volumn , Issue , 2016, Pages 67-73

Machine learning-based mobile threat monitoring and detection

Author keywords

Android Security; Machine Learning; Malware; Static and Dynamic Detection

Indexed keywords

ANDROID (OPERATING SYSTEM); APPLICATION PROGRAMS; ARTIFICIAL INTELLIGENCE; COMPUTER CRIME; COMPUTER OPERATING SYSTEMS; ENGINEERING RESEARCH; LEARNING SYSTEMS; MALWARE; MERCURY (METAL); MOBILE DEVICES; NETWORK SECURITY; SOFTWARE ENGINEERING; WEB SERVICES;

EID: 84983425565     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SERA.2016.7516130     Document Type: Conference Paper
Times cited : (9)

References (17)
  • 1
    • 84957890503 scopus 로고    scopus 로고
    • Can you hear me now the rise of smartphones and their welfare effects
    • A. D. Rennhoff and P. W. Routon. Can you hear me now the rise of smartphones and their welfare effects. Telecommunications Policy, 40(1):39-51, 2016.
    • (2016) Telecommunications Policy , vol.40 , Issue.1 , pp. 39-51
    • Rennhoff, A.D.1    Routon, P.W.2
  • 3
    • 84962897519 scopus 로고    scopus 로고
    • Ensuring mobile device security and compliance at the workplace
    • C. Kleiner and G. Disterer. Ensuring mobile device security and compliance at the workplace. Procedia Computer Science, 64:274-281, 2015.
    • (2015) Procedia Computer Science , vol.64 , pp. 274-281
    • Kleiner, C.1    Disterer, G.2
  • 4
    • 84918840541 scopus 로고    scopus 로고
    • Security considerations related to the use of mobile devices in the operation of critical infrastructures
    • A. Armando, A. Merlo, and L. Verderame. Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7(4):247-256, 2014.
    • (2014) International Journal of Critical Infrastructure Protection , vol.7 , Issue.4 , pp. 247-256
    • Armando, A.1    Merlo, A.2    Verderame, L.3
  • 5
    • 84949627681 scopus 로고    scopus 로고
    • A game of droid and mouse: The threat of split-personality malware on android
    • D. Maier, M. Protsenko, and T. Müller. A game of droid and mouse: The threat of split-personality malware on android. Computers & Security, 54:2-15, 2015.
    • (2015) Computers & Security , vol.54 , pp. 2-15
    • Maier, D.1    Protsenko, M.2    Müller, T.3
  • 8
    • 84927922022 scopus 로고    scopus 로고
    • Improving mobile device security with operating system-level virtualization
    • in press
    • S. Wessel, M. Huber, F. Stumpf, and C. Eckert. Improving mobile device security with operating system-level virtualization. Computers & Security, 2015 in press.
    • (2015) Computers & Security
    • Wessel, S.1    Huber, M.2    Stumpf, F.3    Eckert, C.4
  • 9
    • 84961588444 scopus 로고    scopus 로고
    • Effective detection of android malware based on the usage of data flow apis and machine learning
    • in press
    • S. Wu, P. Wang, X. Li, and Y. Zhang. Effective detection of android malware based on the usage of data flow apis and machine learning. Information and Software Technology, 2016 in press.
    • (2016) Information and Software Technology
    • Wu, S.1    Wang, P.2    Li, X.3    Zhang, Y.4
  • 10
    • 84919487008 scopus 로고    scopus 로고
    • Roid based malware detection using a multifeature collaborative decision fusion approach
    • S. Sheen, R. Anitha, and V. Natarajan.,roid based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151:905-912, 2015.
    • (2015) Neurocomputing , vol.151 , pp. 905-912
    • Sheen, S.1    Anitha, R.2    Natarajan, V.3
  • 14
    • 84949545363 scopus 로고    scopus 로고
    • Cloud computing adoption frame work: A security framework for business clouds
    • V. Chang, Y. Kuo, and M. Ramachandran. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57:24-41, 2016.
    • (2016) Future Generation Computer Systems , vol.57 , pp. 24-41
    • Chang, V.1    Kuo, Y.2    Ramachandran, M.3
  • 15
    • 84960865942 scopus 로고    scopus 로고
    • An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
    • S. K. Pasupuleti, S. Ramalingam, and R. Buyya. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64:12-22, 2016.
    • (2016) Journal of Network and Computer Applications , vol.64 , pp. 12-22
    • Pasupuleti, S.K.1    Ramalingam, S.2    Buyya, R.3
  • 16
    • 84997636309 scopus 로고    scopus 로고
    • Intelligent security model of smart phone based on human behavior in mobile cloud computing
    • D. Moon, I. Kim, J.W. Joo, H.J. Im, J.H. Park, and Y. Jeong. Intelligent security model of smart phone based on human behavior in mobile cloud computing. Wireless Personal Communications, pages 1-14, 2015.
    • (2015) Wireless Personal Communications , pp. 1-14
    • Moon, D.1    Kim, I.2    Joo, J.W.3    Im, H.J.4    Park, J.H.5    Jeong, Y.6
  • 17
    • 84983456163 scopus 로고    scopus 로고
    • Weka 3: Data Mining Software in Java
    • Weka 3: Data Mining Software in Java. http://www.cs.waikato.ac.nz/ml/weka/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.