暂无分享,去创建一个
Eemil Lagerspetz | Petteri Nurmi | Sasu Tarkoma | Adam J. Oliner | Sourav Bhattacharya | Hien Thi Thu Truong | Nadarajah Asokan | P. Nurmi | N. Asokan | A. Oliner | Eemil Lagerspetz | H. Truong | S. Bhattacharya | S. Tarkoma
[1] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[2] Samuel P. Midkiff,et al. What is keeping my phone awake?: characterizing and detecting no-sleep energy bugs in smartphone apps , 2012, MobiSys '12.
[3] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[4] N. Asokan,et al. Old, new, borrowed, blue --: a perspective on the evolution of mobile platform security architectures , 2011, CODASPY '11.
[5] Taghi M. Khoshgoftaar,et al. Predicting susceptibility to social bots on Twitter , 2013, 2013 IEEE 14th International Conference on Information Reuse & Integration (IRI).
[6] Wenke Lee,et al. The Core of the Matter: Analyzing Malicious Traffic in Cellular Carriers , 2013, NDSS.
[7] Sasu Tarkoma,et al. Carat: collaborative energy diagnosis for mobile devices , 2013, SenSys '13.
[8] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[9] Markus Strohmaier,et al. When Social Bots Attack: Modeling Susceptibility of Users in Online Social Networks , 2012, #MSM.
[10] Hee Beng Kuan Tan,et al. Detection of Mobile Malware in the Wild , 2012, Computer.
[11] Vern Paxson,et al. Bro: a system for detecting network intruders in real-time , 1998, Comput. Networks.
[12] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[13] Thorsten Holz,et al. Mobile Malware Detection Based on Energy Fingerprints - A Dead End? , 2013, RAID.
[14] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[15] Steven Myers,et al. Why Mobile-to-Mobile Wireless Malware Won't Cause a Storm , 2011, LEET.
[16] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[17] Liviu Iftode,et al. Enhancing Mobile Malware Detection with Social Collaboration , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[18] Jeremy Clark,et al. Understanding and improving app installation security mechanisms through empirical analysis of android , 2012, SPSM '12.
[19] Pern Hui Chia,et al. Is this app safe?: a large scale study on application permissions and risk signals , 2012, WWW.
[20] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[21] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.