Demanding Requirement of Security for Wireless Mobile Devices: A Survey
暂无分享,去创建一个
[1] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[2] Dennis J. Turner,et al. Symantec Internet Security Threat Report Trends for July 04-December 04 , 2005 .
[3] Herbert Bos,et al. Protecting smart phones by means of execution replication , 2010 .
[4] Jason Flinn,et al. Virtualized in-cloud security services for mobile devices , 2008, MobiVirt '08.
[5] Randy C. Marchany,et al. Using Battery Constraints within Mobile Hosts to Improve Network Security , 2006, IEEE Security & Privacy.
[6] Luis González Abril,et al. A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services , 2011, KSII Trans. Internet Inf. Syst..
[7] Muddassar Farooq,et al. Keystroke-Based User Identification on Smart Phones , 2009, RAID.
[8] Alan J. Marshall,et al. Detection and analysis of the Chameleon WiFi access point virus , 2013, EURASIP J. Inf. Secur..
[9] Marko Helenius,et al. About malicious software in smartphones , 2006, Journal in Computer Virology.
[10] Neal Leavitt. Malicious Code Moves to Mobile Devices , 2000, Computer.
[11] Swee-Huay Heng,et al. Mobile and ubiquitous malware , 2009, MoMM.
[12] Guanhua Yan,et al. SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection , 2009, RAID.
[13] George Lawton. Is It Finally Time to Worry about Mobile Malware? , 2008, Computer.
[14] Sencun Zhu,et al. A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.
[15] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[16] Felix C. Freiling,et al. Mobile Security Catching Up? Revealing the Nuts and Bolts of the Security of Mobile Devices , 2011, 2011 IEEE Symposium on Security and Privacy.
[17] Farnam Jahanian,et al. When mobile is harder than fixed (and vice versa): demystifying security challenges in mobile environments , 2010, HotMobile '10.
[18] Arati Baliga,et al. Rootkits on smart phones: attacks, implications and opportunities , 2010, HotMobile '10.
[19] Felix C. Freiling,et al. Towards Dynamic Malware Analysis to Increase Mobile Device Security423 , 2008, Sicherheit.
[20] Maria Papadaki,et al. Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers , 2012, Secur. Commun. Networks.