System, apparatus, and method for adaptive observation of mobile device behavior

作者: Sudha Anil Gathala , Soorgoli Ashok Halambi , Rajarshi Gupta

DOI:

关键词:

摘要: Methods, devices and systems for detecting suspicious or performance-degrading mobile device behaviors intelligently, dynamically, and/or adaptively determine computing that are to be observed, the number of level detail granularity at which observed. The various aspects efficiently identify without requiring an excessive amount processing, memory, energy resources. Various may correct behaviors. prevent identified from degrading performance power utilization levels a over time. restore aging its original levels.

参考文章(232)
Kira Radinsky, Evgeney Ryzhyk, Moshe Golan, Statistical Network Traffic Signature Analyzer ,(2011)
Ian R. Heidt, Adam W. Perry-Pelletier, Gary G. Damm, Lukas D. Kuhn, Wendell Ruotsi, Eric P. Bilange, Christopher A. Zwickilton, Selectively performing a positioning procedure at an access terminal based on a behavior model ,(2012)
Rajesh Poornachandran, Selim Aissi, Signature-independent, system behavior-based malware detection ,(2011)
Yoram Rimoni, Ashok Halambi, Rajarshi Gupta, Secure behavior analysis over trusted execution environment ,(2013)
Kenneth Alexander Nicolson, Tomoyuki Haga, Hisashi Takayama, Hideki Matsushima, Takayuki Ito, Manabu Maeda, Information security device and counter control method ,(2008)
Leon Gong, Joseph P. Bigus, Christoph Lingenfelder, Deviation detection of usage patterns of computer resources ,(2008)
Feng Qin, Yuanyuan Zhou, System support for improving software dependability during production runs University of Illinois at Urbana-Champaign. ,(2006)