Smartphone nabbing: Analysis of intrusion detection and prevention systems
暂无分享,去创建一个
[1] Ali A. Ghorbani,et al. Characterizing Evaluation Practices of Intrusion Detection Methods for Smartphones , 2014 .
[2] Qiaoyan Wen,et al. Intrusion detection model based on Android , 2011, 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology.
[3] Namitha Jacob. Intrusion Detection in Cloud for Smart Phones , 2013 .
[4] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[5] Ahmed Patel,et al. A survey of intrusion detection and prevention systems , 2010, Inf. Manag. Comput. Secur..
[6] J. Thangakumar,et al. A cloud-based intrusion detection system for Android smartphones , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).
[7] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[8] Sahin Albayrak,et al. Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.
[9] Yuval Elovici,et al. Applying Behavioral Detection on Android-Based Devices , 2010, MOBILWARE.
[10] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[11] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[12] Karen A. Scarfone,et al. Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .
[13] Manoj Kumar,et al. Comprehensive Study of Cloud Computing and Related Security Issues , 2018 .
[14] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[15] William Enck,et al. Defending Users against Smartphone Apps: Techniques and Future Directions , 2011, ICISS.
[16] Xuxian Jiang,et al. Design and implementation of an Android host-based intrusion prevention system , 2014, ACSAC.
[17] Max Landman. Managing smart phone security risks , 2010, InfoSecCD.
[18] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[19] Dae-Ki Kang,et al. Performance analysis of intrusion detection systems for Smartphone security enhancements , 2011, International Conference on Mobile IT Convergence.
[20] Guo,et al. Smart-Phone Attacks and Defenses Chuanxiong , 2004 .