Smartphone malware detection: From a survey towards taxonomy
暂无分享,去创建一个
[1] Beate Commentz-Walter,et al. A String Matching Algorithm Fast on the Average , 1979, ICALP.
[2] Aditya P. Mathur,et al. A Survey of Malware Detection Techniques , 2007 .
[3] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[4] Sahin Albayrak,et al. Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.
[5] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[6] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[7] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[8] Wu Di,et al. Improving Wu-Manber: A Multi-pattern Matching Algorithm , 2008, 2008 IEEE International Conference on Networking, Sensing and Control.
[9] Ali A. Ghorbani,et al. Research on Intrusion Detection and Response: A Survey , 2005, Int. J. Netw. Secur..
[10] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[11] Sahin Albayrak,et al. Detecting Symbian OS malware through static function call analysis , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[12] David Brumley,et al. SplitScreen: Enabling efficient, distributed malware detection , 2010, Journal of Communications and Networks.
[13] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[14] Alfred V. Aho,et al. Efficient string matching , 1975, Commun. ACM.
[15] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[16] George Varghese,et al. Deterministic memory-efficient string matching algorithms for intrusion detection , 2004, IEEE INFOCOM 2004.
[17] Robert Layton,et al. Malware Detection Based on Structural and Behavioural Features of API Calls , 2010 .
[18] Sahin Albayrak,et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[19] Hongli Zhang,et al. A Memory-Efficient Multi-pattern Matching Algorithm Based on the Bitmap , 2009, 2009 Fourth International Conference on Internet Computing for Science and Engineering.
[20] Jan van Lunteren,et al. High-Performance Pattern-Matching for Intrusion Detection , 2006, INFOCOM.
[21] Eric Filiol,et al. Behavioral detection of malware: from a survey towards an established taxonomy , 2008, Journal in Computer Virology.
[22] Tao Wei,et al. Behavior-Based Malware Detection on Mobile Phone , 2010, 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM).
[23] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[24] Somesh Jha,et al. Static Analysis of Executables to Detect Malicious Patterns , 2003, USENIX Security Symposium.
[25] Joseph G. Tront,et al. Mobile Device Profiling and Intrusion Detection Using Smart Batteries , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[26] Survey on Malware Detection Methods , 2009 .
[27] Udi Manber,et al. A FAST ALGORITHM FOR MULTI-PATTERN SEARCHING , 1999 .