Detection of Smartphone Malware

作者: Aubrey-Derrick Schmidt

DOI: 10.14279/DEPOSITONCE-2885

关键词:

摘要:

参考文章(95)
P. Wang, M. C. Gonzalez, C. A. Hidalgo, A.-L. Barabasi, Understanding the spreading patterns of mobile phone viruses. Science. ,vol. 324, pp. 1071- 1076 ,(2009) , 10.1126/SCIENCE.1167053
Jadzia Cendrowska, PRISM: An algorithm for inducing modular rules International Journal of Human-computer Studies \/ International Journal of Man-machine Studies. ,vol. 27, pp. 349- 370 ,(1987) , 10.1016/S0020-7373(87)80003-2
G. Roussos, A.J. Marsh, S. Maglavera, Enabling pervasive computing with smart phones IEEE Pervasive Computing. ,vol. 4, pp. 20- 27 ,(2005) , 10.1109/MPRV.2005.30
Darren Mutz, Fredrik Valeur, Giovanni Vigna, Christopher Kruegel, Anomalous system call detection ACM Transactions on Information and System Security. ,vol. 9, pp. 61- 93 ,(2006) , 10.1145/1127345.1127348
Jerry Cheng, Starsky H.Y. Wong, Hao Yang, Songwu Lu, SmartSiren Proceedings of the 5th international conference on Mobile systems, applications and services - MobiSys '07. pp. 258- 271 ,(2007) , 10.1145/1247660.1247690
Thomas Bläsing, Leonid Batyuk, Aubrey-Derrick Schmidt, Seyit Ahmet Camtepe, Sahin Albayrak, An Android Application Sandbox system for suspicious software detection international conference on malicious and unwanted software. pp. 55- 62 ,(2010) , 10.1109/MALWARE.2010.5665792
Cynthia Wagner, Gerard Wagener, Radu State, Thomas Engel, Malware analysis with graph kernels and support vector machines international conference on malicious and unwanted software. pp. 63- 68 ,(2009) , 10.1109/MALWARE.2009.5403018
Patrick Traynor, W. Enck, P. McDaniel, T. La Porta, Mitigating attacks on open functionality in SMS-capable cellular networks IEEE ACM Transactions on Networking. ,vol. 17, pp. 40- 53 ,(2009) , 10.1109/TNET.2008.925939
Hahnsang Kim, Joshua Smith, Kang G. Shin, Detecting energy-greedy anomalies and mobile malware variants Proceeding of the 6th international conference on Mobile systems, applications, and services - MobiSys '08. pp. 239- 252 ,(2008) , 10.1145/1378600.1378627
S.M. Furnell, A. Jusoh, D. Katsabas, The challenges of understanding and using security: A survey of end-users Computers & Security. ,vol. 25, pp. 27- 35 ,(2006) , 10.1016/J.COSE.2005.12.004