Trusted Detection of Sensitive Activities on Mobile Phones Using Power Consumption Measurements
暂无分享,去创建一个
[1] Joseph G. Tront,et al. Mobile Device Profiling and Intrusion Detection Using Smart Batteries , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[2] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[3] Grigorios Tsoumakas,et al. MULAN: A Java Library for Multi-Label Learning , 2011, J. Mach. Learn. Res..
[4] Grigorios Tsoumakas,et al. Mining Multi-label Data , 2010, Data Mining and Knowledge Discovery Handbook.
[5] B Preetham Kumar. Digital Signal Processing Laboratory , 2010 .
[6] K. B. Klaassen. Electronic Measurement and Instrumentation , 1996 .
[7] Lior Rokach,et al. Data Mining And Knowledge Discovery Handbook , 2005 .
[8] Grant A. Jacoby,et al. Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[9] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[10] J. A. Connelly,et al. Low noise electronic system design , 1993 .
[11] Zhibo Wu,et al. Power Consumption in Smartphones (Hardware Behaviourism) , 2012 .
[12] Shivakant Mishra,et al. Location based power analysis to detect malicious code in smartphones , 2011, SPSM '11.
[13] Michael S. Hsiao,et al. Towards an intrusion detection system for battery exhaustion attacks on mobile computing devices , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[14] Yiran Chen,et al. How is energy consumed in smartphone display applications? , 2013, HotMobile '13.
[15] Ming Zhang,et al. Where is the energy spent inside my app?: fine grained energy accounting on smartphones with Eprof , 2012, EuroSys '12.
[16] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[17] Simon Hay,et al. Decomposing power measurements for mobile devices , 2010, 2010 IEEE International Conference on Pervasive Computing and Communications (PerCom).
[18] T. Hughes,et al. Signals and systems , 2006, Genome Biology.
[19] Grigorios Tsoumakas,et al. Multi-Label Classification: An Overview , 2007, Int. J. Data Warehous. Min..
[20] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[21] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[22] Lior Rokach,et al. Exploiting label dependencies for improved sample complexity , 2013, Machine Learning.
[23] Douglas C. Schmidt,et al. Analyzing Mobile Application Software Power Consumption via Model-driven Engineering , 2011, PECCS.
[24] Thomas Zefferer,et al. Power Consumption-based Application Classification and Malware Detection on Android Using Machine-Learning Techniques , 2013 .