A static approach towards mobile botnet detection
暂无分享,去创建一个
Jasni Mohamad Zain | Zakira Inayat | Riaz Ul Haq | Shahid Anwar | Aws Naser Jabir | Ahmad Karim | S. Anwar | Jasni Mohamad Zain | Zakira Inayat | R. Haq | Ahmad Karim | A. N. Jabir
[1] Madihah Mohd Saudi,et al. Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm , 2015 .
[2] Ali A. Ghorbani,et al. Android Botnets: What URLs are Telling Us , 2015, NSS.
[3] Irwan,et al. Confidentiality and privacy information security risk assessment for Android-based mobile devices , 2015, 2015 International Conference on Data and Software Engineering (ICoDSE).
[4] Shahaboddin Shamshirband,et al. Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues , 2015, KSII Trans. Internet Inf. Syst..
[5] Nor Badrul Anuar,et al. Intrusion response systems: Foundations, design, and challenges , 2016, J. Netw. Comput. Appl..
[6] Julius Beneoluchi Odili,et al. Response option for attacks detected by intrusion detection system , 2015, 2015 4th International Conference on Software Engineering and Computer Systems (ICSECS).
[7] Zolkipli Mohamad Fadli,et al. A Review Paper on Botnet and Botnet Detection Techniques in Cloud Computing , 2014 .
[8] Ali A. Ghorbani,et al. SMS mobile botnet detection using a multi-agent system: research in progress , 2014, ACySE '14.
[9] M. Sheelagh T. Carpendale,et al. Papilio: Visualizing Android Application Permissions , 2014, Comput. Graph. Forum.
[10] Isil Dillig,et al. Apposcopy: semantics-based detection of Android malware through static analysis , 2014, SIGSOFT FSE.
[11] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[12] Hein S. Venter,et al. Mobile Botnet Detection Using Network Forensics , 2010, FIS.
[13] Gonzalo Álvarez,et al. MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID , 2013, Cybern. Syst..
[14] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[15] Erol Gelenbe,et al. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.