Security aspects of mobile phone virus: a critical survey
暂无分享,去创建一个
Binshan Lin | Hsiu-Sen Chiang | Ming-Hung Shih | Dong-Her Shih | B. Lin | Dong-Her Shih | Hsiu-Sen Chiang | Ming-Hung Shih | Binshan Lin
[1] Denis Zenkin. Fighting Against the Invisible Enemy - Methods for detecting an unknown virus , 2001, Comput. Secur..
[2] Marko Helenius,et al. About malicious software in smartphones , 2006, Journal in Computer Virology.
[3] Young B. Choi,et al. The pricing of wireless phone services in the USA: issues and development trends , 2007, Int. J. Mob. Commun..
[4] Binshan Lin,et al. Identity theft in the USA: evidence from 2002 to 2006 , 2008, Int. J. Mob. Commun..
[5] Jiaqin Yang,et al. Social reference group influence on mobile phone purchasing behaviour: a cross-nation comparative study , 2007, Int. J. Mob. Commun..
[6] C.J. Harris,et al. The application of CMAC based intelligent agents in the detection of previously unseen computer viruses , 1999, Proceedings 1999 International Conference on Information Intelligence and Systems (Cat. No.PR00446).
[7] Mark Howell,et al. User characteristics and performance with automated mobile phone systems , 2008, Int. J. Mob. Commun..
[8] Alan D. Smith,et al. Establishing standards for wireless security in a security-conscious world , 2007, Int. J. Serv. Stand..
[9] Hong Tat Ewe,et al. A Mobile Phone Malicious Software Detection Model with Behavior Checker , 2005, Human.Society@Internet.
[10] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.
[11] David C. Yen,et al. Classification methods in the detection of new malicious emails , 2005, Inf. Sci..
[12] Jieh Hsiang,et al. A generic virus detection agent on the Internet , 1997, Proceedings of the Thirtieth Hawaii International Conference on System Sciences.
[13] Hsiu-Sen Chiang,et al. E-mail viruses: how organizations can protect their e-mails , 2004, Online Inf. Rev..
[14] Mikko Hypponen,et al. Malware goes mobile. , 2006, Scientific American.
[15] Brian D. Noble,et al. Modeling epidemic spreading in mobile environments , 2005, WiSe '05.
[16] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .
[17] Gary E. Gorman,et al. Internet use in South Korea , 2002, Online Inf. Rev..
[18] Peter J. Clarke,et al. Testing and evaluating virus detectors for handheld devices , 2006, Journal in Computer Virology.
[19] Dong Li,et al. An Epidemic Model of Mobile Phone Virus , 2006, 2006 First International Symposium on Pervasive Computing and Applications.