-
1
-
-
84997282976
-
-
Web Link
-
Web Link http://www. idc. com/prodserv/smartphone-os-market-share. jsp
-
-
-
-
2
-
-
84997282974
-
-
Web Link
-
Web Link http://www. Technologyreview. com/view/516446/six-percentof-free-android-apps-hide-intrusive-adware/
-
-
-
-
3
-
-
58149104386
-
Guide to intrusion detection and prevention systems (IDPS)
-
Scarfone, Karen, and Peter Mell. "Guide to intrusion detection and prevention systems (IDPS). " NIST special publication 800, no. 2007 (2007): 94.
-
(2007)
NIST Special Publication
, vol.800
, Issue.2007
, pp. 94
-
-
Scarfone, K.1
Mell, P.2
-
4
-
-
84954568667
-
Design and implementation of an android host-based intrusion prevention system
-
ACM
-
Sun, Mingshen, Min Zheng, John Lui, and Xuxian Jiang. "Design and implementation of an android host-based intrusion prevention system. " In Proceedings of the 30th Annual Computer Security Applications Conference, pp. 226-235. ACM, 2014.
-
(2014)
Proceedings of the 30th Annual Computer Security Applications Conference
, pp. 226-235
-
-
Sun, M.1
Zheng, M.2
Lui, J.3
Jiang, X.4
-
6
-
-
84856225193
-
Andromaly: A behavioral malware detection framework for android devices
-
Shabtai, Asaf, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. ""Andromaly": A behavioral malware detection framework for android devices. "Journal of Intelligent Information Systems 38, no. 1 (2012): 161-190.
-
(2012)
Journal of Intelligent Information Systems 38
, Issue.1
, pp. 161-190
-
-
Shabtai, A.1
Kanonov, U.2
Elovici, Y.3
Glezer, C.4
Weiss, Y.5
-
7
-
-
34247497767
-
Smart-phone attacks and defenses
-
Guo, Chuanxiong, Helen J. Wang, and Wenwu Zhu. "Smart-phone attacks and defenses. " In hotnets III. 2004.
-
(2004)
Hotnets III
-
-
Guo, C.1
Wang, H.J.2
Zhu, W.3
-
9
-
-
80052184968
-
A cloud-based intrusion detection and response system for mobile phones
-
IEEE
-
Houmansadr, Amir, Saman Zonouz, and Robin Berthier. "A cloud-based intrusion detection and response system for mobile phones. " In Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on, pp. 31-32. IEEE, 2011.
-
(2011)
Dependable Systems and Networks Workshops (DSN-W), 2011 IEEE/IFIP 41st International Conference on
, pp. 31-32
-
-
Houmansadr, A.1
Zonouz, S.2
Berthier, R.3
-
11
-
-
81855220939
-
Defending users against smartphone apps: Techniques and future directions
-
Springer Berlin Heidelberg
-
Enck, William. "Defending users against smartphone apps: Techniques and future directions. " In Information Systems Security, pp. 49-70. Springer Berlin Heidelberg, 2011.
-
(2011)
Information Systems Security
, pp. 49-70
-
-
Enck, W.1
-
12
-
-
84901246064
-
Evolution, detection and analysis of malware for smart devices
-
Suarez-Tangil, Guillermo, Juan E. Tapiador, Pedro Peris-Lopez, and Arturo Ribagorda. "Evolution, detection and analysis of malware for smart devices. "Communications Surveys & Tutorials, IEEE 16, no. 2 (2014): 961-987.
-
(2014)
Communications Surveys & Tutorials, IEEE
, vol.16
, Issue.2
, pp. 961-987
-
-
Suarez-Tangil, G.1
Tapiador, J.E.2
Peris-Lopez, P.3
Ribagorda, A.4
-
14
-
-
84874470449
-
A cloud-based intrusion detection system for Android smartphones
-
IEEE
-
Khune, Rohit S., and J. Thangakumar. "A cloud-based intrusion detection system for Android smartphones. " In Radar, Communication and Computing (ICRCC), 2012 International Conference on, pp. 180-184. IEEE, 2012.
-
(2012)
Radar, Communication and Computing (ICRCC), 2012 International Conference on
, pp. 180-184
-
-
Khune, R.S.1
Thangakumar, J.2
-
15
-
-
81055149670
-
Performance analysis of intrusion detection systems for smartphone security enhancements
-
IEEE
-
Salah, Saber, Sami Abduljalil Abdulhak, Hyontai Sug, Dae-Ki Kang, and HoonJae Lee. "Performance analysis of intrusion detection systems for smartphone security enhancements. " In Mobile IT Convergence (ICMIC), 2011 International Conference on, pp. 15-19. IEEE, 2011.
-
(2011)
Mobile IT Convergence (ICMIC), 2011 International Conference on
, pp. 15-19
-
-
Salah, S.1
Abduljalil Abdulhak, S.2
Sug, H.3
Kang, D.4
Lee, H.5
-
16
-
-
78049513508
-
A survey of intrusion detection and prevention systems
-
Patel, Ahmed, Qais Qassim, and Christopher Wills. "A survey of intrusion detection and prevention systems. " Information Management & Computer Security 18, no. 4 (2010): 277-290.
-
(2010)
Information Management & Computer Security
, vol.18
, Issue.4
, pp. 277-290
-
-
Patel, A.1
Qassim, Q.2
Wills, C.3
-
19
-
-
77950172440
-
Smartphone malware evolution revisited: Android next target?
-
IEEE
-
Schmidt, Aubrey-Derrick, Hans-Gunther Schmidt, Leonid Batyuk, Jan Hendrik Clausen, Seyit Ahmet Camtepe, Sahin Albayrak, and Can Yildizli. "Smartphone malware evolution revisited: Android next target?" In Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on, pp. 1-7. IEEE, 2009.
-
(2009)
Malicious and Unwanted Software (MALWARE), 2009 4th International Conference on
, pp. 1-7
-
-
Schmidt, A.-D.1
Schmidt, H.2
Batyuk, L.3
Hendrik Clausen, J.4
Ahmet Camtepe, S.5
Albayrak, S.6
Yildizli, C.7
-
20
-
-
70449482715
-
Static analysis of executables for collaborative malware detection on android
-
IEEE
-
Schmidt, Aubrey-Derrick, Rainer Bye, Hans-Gunther Schmidt, Jan Clausen, Osman Kiraz, Kamer Yüksel, Seyit Camtepe, and Sahin Albayrak. "Static analysis of executables for collaborative malware detection on android. " In communications, 2009. ICC'09. IEEE International Conference on, pp. 1-5. IEEE, 2009.
-
(2009)
Communications, 2009. ICC'09. IEEE International Conference on
, pp. 1-5
-
-
Schmidt, A.-D.1
Bye, R.2
Schmidt, H.3
Clausen, J.4
Kiraz, O.5
Yüksel, K.6
Camtepe, S.7
Albayrak, S.8
-
21
-
-
84867714245
-
Applying behavioral detection on android-based devices
-
Springer Berlin Heidelberg
-
Shabtai, Asaf, and Yuval Elovici. "Applying behavioral detection on android-based devices. " In Mobile Wireless Middleware, Operating Systems, and Applications, pp. 235-249. Springer Berlin Heidelberg, 2010.
-
(2010)
Mobile Wireless Middleware, Operating Systems, and Applications
, pp. 235-249
-
-
Shabtai, A.1
Elovici, Y.2
-
23
-
-
84997364892
-
Comprehensive study of cloud computing and related security issues
-
Springer, New Delhi, 2-5 Dec.
-
M. Khari, M. Kumar, Vaishali "Comprehensive Study of Cloud Computing and Related Security Issues" Computer Society of India (CSI), 50th Golden Jubilee Annual Convention, Springer, New Delhi, 2-5 Dec., 2015.
-
(2015)
Computer Society of India (CSI), 50th Golden Jubilee Annual Convention
-
-
Khari, M.1
Kumar, M.2
Vaishali3
|