Towards energy-aware intrusion detection systems on mobile devices
暂无分享,去创建一个
Alessio Merlo | Mauro Migliardi | Simone Schiappacasse | Monica Curti | M. Migliardi | A. Merlo | M. Curti | Simone Schiappacasse
[1] Gernot Heiser,et al. An Analysis of Power Consumption in a Smartphone , 2010, USENIX Annual Technical Conference.
[2] Ilias Maglogiannis,et al. Mobile healthcare information management utilizing Cloud Computing and Android OS , 2010, 2010 Annual International Conference of the IEEE Engineering in Medicine and Biology.
[3] Lei Yang,et al. Accurate online power estimation and automatic battery behavior based power model generation for smartphones , 2010, 2010 IEEE/ACM/IFIP International Conference on Hardware/Software Codesign and System Synthesis (CODES+ISSS).
[4] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[5] Alessandro Armando,et al. Would You Mind Forking This Process? A Denial of Service Attack on Android (and Some Countermeasures) , 2012, SEC.
[6] Hojung Cha,et al. AppScope: Application Energy Metering Framework for Android Smartphone Using Kernel Activity Monitoring , 2012, USENIX Annual Technical Conference.
[7] Nataraj Kuntagod,et al. Mobile decision support system for outreach health worker , 2011, 2011 IEEE 13th International Conference on e-Health Networking, Applications and Services.
[8] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[9] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[10] Michael S. Hsiao,et al. Denial-of-service attacks on battery-powered mobile computers , 2004, Second IEEE Annual Conference on Pervasive Computing and Communications, 2004. Proceedings of the.
[11] Alessio Merlo,et al. The energy impact of security mechanisms in modern mobile devices , 2012, Netw. Secur..
[12] S. Zielinski,et al. International Court of Justice , 2002, International Organization.
[13] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[14] Alessandro Armando,et al. An Empirical Evaluation of the Android Security Framework , 2013, SEC.
[15] Alessio Merlo,et al. What is Green Security? , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[16] Jane W.-S. Liu,et al. Wedjat: A Mobile Phone Based Medicine In-take Reminder and Monitor , 2009, 2009 Ninth IEEE International Conference on Bioinformatics and BioEngineering.
[17] K.W. Derr,et al. Nightmares with Mobile Devices are Just around the Corner! , 2007, 2007 IEEE International Conference on Portable Information Devices.
[18] Lorenzo Chiari,et al. Smartphone-based applications for investigating falls and mobility , 2011, 2011 5th International Conference on Pervasive Computing Technologies for Healthcare (PervasiveHealth) and Workshops.
[19] Tom Martin,et al. Mobile phones as computing devices: the viruses are coming! , 2004, IEEE Pervasive Computing.