A Non-cooperative Game Approach for Intrusion Detection in Smartphone Systems
暂无分享,去创建一个
Feng Yang | Xuehai Zhou | Gangyong Jia | Qiyuan Zhang | Xuehai Zhou | Feng Yang | Gangyong Jia | Qiyuan Zhang
[1] Sajal K. Das,et al. A game theory based approach for security in wireless sensor networks , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[2] Kang G. Shin,et al. Behavioral detection of malware on mobile handsets , 2008, MobiSys '08.
[3] Sahin Albayrak,et al. Monitoring Android for Collaborative Anomaly Detection: A First Architectural Draft , 2008 .
[4] Songwu Lu,et al. SmartSiren: virus detection and alert for smartphones , 2007, MobiSys '07.
[5] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[6] Gerald Tesauro,et al. Neural networks for computer virus recognition , 1996 .
[7] Vikram Srinivasan,et al. Cooperation in wireless ad hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[8] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[9] Deepak Venugopal,et al. Efficient signature based malware detection on mobile devices , 2008, Mob. Inf. Syst..
[10] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[11] Joseph G. Tront,et al. Mobile Device Profiling and Intrusion Detection Using Smart Batteries , 2008, Proceedings of the 41st Annual Hawaii International Conference on System Sciences (HICSS 2008).
[12] Deepak Venugopal,et al. An efficient signature representation and matching method for mobile devices , 2006, WICON '06.
[13] Sahin Albayrak,et al. Smartphone malware evolution revisited: Android next target? , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[14] Sajal K. Das,et al. Intrusion detection in sensor networks: a non-cooperative game approach , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[15] Yenumula B. Reddy,et al. A Game Theory Approach to Detect Malicious Nodes in Wireless Sensor Networks , 2009, 2009 Third International Conference on Sensor Technologies and Applications.
[16] J. Nash,et al. NON-COOPERATIVE GAMES , 1951, Classics in Game Theory.
[17] Helen J. Wang,et al. Smartphone attacks and defenses , 2004 .
[18] Murali S. Kodialam,et al. Detecting network intrusions via sampling: a game theoretic approach , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).