Mobile cloud offloading for malware detections with learning
暂无分享,去创建一个
Liang Xiao | Jinliang Liu | Yanda Li | Qiangda Li | Liang Xiao | Qiangda Li | Yanda Li | Jinliang Liu
[1] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[2] Bharat K. Bhargava,et al. A Survey of Computation Offloading for Mobile Systems , 2012, Mobile Networks and Applications.
[3] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[4] Man Ho Au,et al. Security and privacy in big data , 2016, Concurr. Comput. Pract. Exp..
[5] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[6] Massoud Pedram,et al. A Bayesian Game Formulation of Power Dissipation and Response Time Minimization in a Mobile Cloud Computing System , 2013 .
[7] Katinka Wolter,et al. Tradeoff between performance improvement and energy saving in mobile cloud offloading systems , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[8] Jean-Pierre Seifert,et al. pBMDS: a behavior-based malware detection system for cellphone devices , 2010, WiSec '10.
[9] Sokol Kosta,et al. To offload or not to offload? The bandwidth and energy costs of mobile cloud computing , 2013, 2013 Proceedings IEEE INFOCOM.
[10] H. Vincent Poor,et al. Prospect theoretic analysis of anti-jamming communications in cognitive radio networks , 2014, 2014 IEEE Global Communications Conference.
[11] H. Vincent Poor,et al. Prospect Theoretic Analysis of Energy Exchange Among Microgrids , 2015, IEEE Transactions on Smart Grid.
[12] K. J. Ray Liu,et al. Indirect Reciprocity Security Game for Large-Scale Wireless Networks , 2012, IEEE Transactions on Information Forensics and Security.
[13] H. Vincent Poor,et al. Secure mobile crowdsensing game , 2015, 2015 IEEE International Conference on Communications (ICC).
[14] Ariel Rubinstein,et al. A Course in Game Theory , 1995 .
[15] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[16] Frank Buschmann,et al. Innovation Reconsidered , 2013, IEEE Software.
[17] Alec Wolman,et al. MAUI: making smartphones last longer with code offload , 2010, MobiSys '10.
[18] Yung-Hsiang Lu,et al. Cloud Computing for Mobile Users: Can Offloading Computation Save Energy? , 2010, Computer.
[19] Chandra Krintz,et al. Using bandwidth data to make computation offloading decisions , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing.
[20] Martin J. Osborne. Corrections and updates for fourth printing of Osborne and Rubinstein's "A Course in Game Theory" (MIT Press, 1994) , 2012 .