A Survey on mobile malware: War without end
暂无分享,去创建一个
[1] Ning Zhong,et al. Network immunization and virus propagation in email networks: experimental evaluation and analysis , 2010, Knowledge and Information Systems.
[2] Grant A. Jacoby,et al. Battery-based intrusion detection , 2004, IEEE Global Telecommunications Conference, 2004. GLOBECOM '04..
[3] Mauro Conti,et al. FM 99.9, Radio Virus: Exploiting FM Radio Broadcasts for Malware Deployment , 2013, IEEE Transactions on Information Forensics and Security.
[4] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[5] Christopher Krügel,et al. A survey on automated dynamic malware-analysis techniques and tools , 2012, CSUR.
[6] Hee Beng Kuan Tan,et al. Detection of Mobile Malware in the Wild , 2012, Computer.
[7] Albert-László Barabási,et al. Understanding individual human mobility patterns , 2008, Nature.
[8] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[9] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[10] Daniele Sgandurra,et al. A Survey on Security for Mobile Devices , 2013, IEEE Communications Surveys & Tutorials.
[11] Guanhua Yan,et al. Modeling Propagation Dynamics of Bluetooth Worms (Extended Version) , 2009, IEEE Transactions on Mobile Computing.
[12] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[13] Jiming Liu,et al. Modeling and Restraining Mobile Virus Propagation , 2013, IEEE Transactions on Mobile Computing.
[14] Robert H. Deng,et al. Insights into Malware Detection and Prevention on Mobile Phones , 2009, FGIT-SecTech.
[15] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.