Passive security intelligence to analyze the security risks of mobile/BYOD activities
暂无分享,去创建一个
Mihai Christodorescu | Kapil Singh | Xin Hu | Suresh Chari | Josyula R. Rao | Larry Koved | Reiner Sailer | Douglas Lee Schales | Marc Ph. Stoecklin | P.-C. Cheng
[1] Yong Liao,et al. AppPrint: Automatic Fingerprinting of Mobile Applications in Network Traffic , 2015, PAM.
[2] Michele Colajanni,et al. A collaborative framework for intrusion detection in mobile networks , 2015, Inf. Sci..
[3] Shu-Chiung Lin,et al. Simple and effective method for detecting abnormal internet behaviors of mobile devices , 2015, Inf. Sci..
[4] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[5] Michele Colajanni,et al. The Problem of NIDS Evasion in Mobile Networks , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[6] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Qiang Xu,et al. Identifying diverse usage behaviors of smartphone apps , 2011, IMC '11.
[8] Ling Huang,et al. I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis , 2014, Privacy Enhancing Technologies.