暂无分享,去创建一个
[1] Xinwen Zhang,et al. A Trusted Mobile Phone Prototype , 2008, 2008 5th IEEE Consumer Communications and Networking Conference.
[2] Felix C. Freiling,et al. Towards Dynamic Malware Analysis to Increase Mobile Device Security423 , 2008, Sicherheit.
[3] VenugopalDeepak,et al. Efficient signature based malware detection on mobile devices , 2008 .
[4] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[5] Jean-Pierre Seifert,et al. pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.
[6] Deepak Venugopal,et al. Efficient signature based malware detection on mobile devices , 2008, Mob. Inf. Syst..
[7] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[8] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[9] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[10] Vasileios Karyotis,et al. Malware-Propagative Mobile Ad Hoc Networks: Asymptotic Behavior Analysis , 2008, Journal of Computer Science and Technology.
[11] Sencun Zhu,et al. Designing System-Level Defenses against Cellphone Malware , 2009, 2009 28th IEEE International Symposium on Reliable Distributed Systems.
[12] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[13] Helen J. Wang,et al. Smart-Phone Attacks and Defenses , 2004 .
[14] Qiang Yan,et al. On the Potential of Limitation-oriented Malware Detection and Prevention Techniques on Mobile Phones , 2010 .
[15] Nicoleta Roman,et al. Intelligent virus detection on mobile devices , 2006, PST.
[16] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[17] Kang G. Shin,et al. On Mobile Viruses Exploiting Messaging and Bluetooth Services , 2006, 2006 Securecomm and Workshops.
[18] Deepak Venugopal,et al. A Malware Signature Extraction and Detection Method Applied to Mobile Networks , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[19] Kang G. Shin,et al. Propagation, Detection and Containment of Mobile Malware , 2008 .
[20] Felix C. Freiling,et al. Toward Automated Dynamic Malware Analysis Using CWSandbox , 2007, IEEE Secur. Priv..