-
1
-
-
84957890503
-
Can you hear me now the rise of smartphones and their welfare effects
-
A. D. Rennhoff and P. W. Routon. Can you hear me now the rise of smartphones and their welfare effects. Telecommunications Policy, 40(1):39-51, 2016.
-
(2016)
Telecommunications Policy
, vol.40
, Issue.1
, pp. 39-51
-
-
Rennhoff, A.D.1
Routon, P.W.2
-
3
-
-
84962897519
-
Ensuring mobile device security and compliance at the workplace
-
C. Kleiner and G. Disterer. Ensuring mobile device security and compliance at the workplace. Procedia Computer Science, 64:274-281, 2015.
-
(2015)
Procedia Computer Science
, vol.64
, pp. 274-281
-
-
Kleiner, C.1
Disterer, G.2
-
4
-
-
84918840541
-
Security considerations related to the use of mobile devices in the operation of critical infrastructures
-
A. Armando, A. Merlo, and L. Verderame. Security considerations related to the use of mobile devices in the operation of critical infrastructures. International Journal of Critical Infrastructure Protection, 7(4):247-256, 2014.
-
(2014)
International Journal of Critical Infrastructure Protection
, vol.7
, Issue.4
, pp. 247-256
-
-
Armando, A.1
Merlo, A.2
Verderame, L.3
-
5
-
-
84949627681
-
A game of droid and mouse: The threat of split-personality malware on android
-
D. Maier, M. Protsenko, and T. Müller. A game of droid and mouse: The threat of split-personality malware on android. Computers & Security, 54:2-15, 2015.
-
(2015)
Computers & Security
, vol.54
, pp. 2-15
-
-
Maier, D.1
Protsenko, M.2
Müller, T.3
-
6
-
-
84927636536
-
Towards neural network based malware detection on android mobile devices
-
Springer International Publishing
-
W. Yu, L. Ge, G. Xu, and X. Fu. Towards neural network based malware detection on android mobile devices. In Cybersecurity Systems for Human Cognition Augmentation, Advances in Information Security, pages 99-117. Springer International Publishing, 2014.
-
(2014)
Cybersecurity Systems for Human Cognition Augmentation, Advances in Information Security
, pp. 99-117
-
-
Yu, W.1
Ge, L.2
Xu, G.3
Fu, X.4
-
7
-
-
84897594353
-
Detecting mobile malware threats to homeland security through static analysis
-
S. Seo, A. Gupta, A. M. Sallam, E. Bertino, and Yim K. Detecting mobile malware threats to homeland security through static analysis. Journal of Network and Computer Applications, 38:43-53, 2014.
-
(2014)
Journal of Network and Computer Applications
, vol.38
, pp. 43-53
-
-
Seo, S.1
Gupta, A.2
Sallam, A.M.3
Bertino, E.4
Yim, K.5
-
8
-
-
84927922022
-
Improving mobile device security with operating system-level virtualization
-
in press
-
S. Wessel, M. Huber, F. Stumpf, and C. Eckert. Improving mobile device security with operating system-level virtualization. Computers & Security, 2015 in press.
-
(2015)
Computers & Security
-
-
Wessel, S.1
Huber, M.2
Stumpf, F.3
Eckert, C.4
-
9
-
-
84961588444
-
Effective detection of android malware based on the usage of data flow apis and machine learning
-
in press
-
S. Wu, P. Wang, X. Li, and Y. Zhang. Effective detection of android malware based on the usage of data flow apis and machine learning. Information and Software Technology, 2016 in press.
-
(2016)
Information and Software Technology
-
-
Wu, S.1
Wang, P.2
Li, X.3
Zhang, Y.4
-
10
-
-
84919487008
-
Roid based malware detection using a multifeature collaborative decision fusion approach
-
S. Sheen, R. Anitha, and V. Natarajan.,roid based malware detection using a multifeature collaborative decision fusion approach. Neurocomputing, 151:905-912, 2015.
-
(2015)
Neurocomputing
, vol.151
, pp. 905-912
-
-
Sheen, S.1
Anitha, R.2
Natarajan, V.3
-
11
-
-
84925843954
-
Mobile code offloading: From concept to practice and beyond
-
H. Flores, P. Hui, S. Tarkoma, Y. Li, S. Srirama, and R. Buyya. Mobile code offloading: From concept to practice and beyond. IEEE Communications Magazine, 53(3):80-88, 2015.
-
(2015)
IEEE Communications Magazine
, vol.53
, Issue.3
, pp. 80-88
-
-
Flores, H.1
Hui, P.2
Tarkoma, S.3
Li, Y.4
Srirama, S.5
Buyya, R.6
-
12
-
-
84894675432
-
Heterogeneity in mobile cloud computing: Taxonomy and open challenges
-
Z. Sanaei, S. Abolfazli, A. Gani, and R. Buyya. Heterogeneity in mobile cloud computing: Taxonomy and open challenges. IEEE Communications Surveys & Tutorials, 16(1):369-392, 2014.
-
(2014)
IEEE Communications Surveys & Tutorials
, vol.16
, Issue.1
, pp. 369-392
-
-
Sanaei, Z.1
Abolfazli, S.2
Gani, A.3
Buyya, R.4
-
13
-
-
84956933683
-
Software defined cloud: Survey, system and evaluation
-
Y. Jararweh, M. Al-Ayyoub, A. Darabseh, E. Benkhelifa, M. Vouk, and A. Rindos. Software defined cloud: Survey, system and evaluation. Future Generation Computer Systems, 58:56-74, 2016.
-
(2016)
Future Generation Computer Systems
, vol.58
, pp. 56-74
-
-
Jararweh, Y.1
Al-Ayyoub, M.2
Darabseh, A.3
Benkhelifa, E.4
Vouk, M.5
Rindos, A.6
-
14
-
-
84949545363
-
Cloud computing adoption frame work: A security framework for business clouds
-
V. Chang, Y. Kuo, and M. Ramachandran. Cloud computing adoption framework: A security framework for business clouds. Future Generation Computer Systems, 57:24-41, 2016.
-
(2016)
Future Generation Computer Systems
, vol.57
, pp. 24-41
-
-
Chang, V.1
Kuo, Y.2
Ramachandran, M.3
-
15
-
-
84960865942
-
An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing
-
S. K. Pasupuleti, S. Ramalingam, and R. Buyya. An efficient and secure privacy-preserving approach for outsourced data of resource constrained mobile devices in cloud computing. Journal of Network and Computer Applications, 64:12-22, 2016.
-
(2016)
Journal of Network and Computer Applications
, vol.64
, pp. 12-22
-
-
Pasupuleti, S.K.1
Ramalingam, S.2
Buyya, R.3
-
16
-
-
84997636309
-
Intelligent security model of smart phone based on human behavior in mobile cloud computing
-
D. Moon, I. Kim, J.W. Joo, H.J. Im, J.H. Park, and Y. Jeong. Intelligent security model of smart phone based on human behavior in mobile cloud computing. Wireless Personal Communications, pages 1-14, 2015.
-
(2015)
Wireless Personal Communications
, pp. 1-14
-
-
Moon, D.1
Kim, I.2
Joo, J.W.3
Im, H.J.4
Park, J.H.5
Jeong, Y.6
-
17
-
-
84983456163
-
-
Weka 3: Data Mining Software in Java
-
Weka 3: Data Mining Software in Java. http://www.cs.waikato.ac.nz/ml/weka/.
-
-
-
|