Articles
Scholar
About 350 results (0.03 sec)
The evolution of android malware and android analysis techniques
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
amounts of sensitive information. Sophisticated mobile malware, particularly Android …
A survey on security for mobile devices
M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …
to access a large variety of ubiquitous services. In recent years, the availability of these …
Crowdroid: behavior-based malware detection system for android
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …
posed to becoming a market leader makes the need for malware analysis on this platform an …
On lightweight mobile phone application certification
W Enck, M Ongtang, P McDaniel - … of the 16th ACM conference on …, 2009 - dl.acm.org
Users have begun downloading an increasingly large number of mobile phone applications
in response to advancements in handsets and wireless networks. The increased number of …
in response to advancements in handsets and wireless networks. The increased number of …
“Andromaly”: a behavioral malware detection framework for android devices
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …
devices. The proposed framework realizes a Host-based Malware Detection System that …
Machine learning aided Android malware classification
N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …
private and confidential information have resulted in these devices being targeted by …
Apex: extending android permission model and enforcement with user-defined runtime constraints
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …
allows developers to easily create applications and users to readily install them. However …
Privacy protection for preventing data over-collection in smart city
In smart city, all kinds of users' data are stored in electronic devices to make everything
intelligent. A smartphone is the most widely used electronic device and it is the pivot of all …
intelligent. A smartphone is the most widely used electronic device and it is the pivot of all …
A survey on machine learning in Internet of Things: Algorithms, strategies, and applications
In the IoT and WSN era, large number of connected objects and sensing devices are
dedicated to collect, transfer, and generate a huge amount of data for a wide variety of fields …
dedicated to collect, transfer, and generate a huge amount of data for a wide variety of fields …
Understanding the spreading patterns of mobile phone viruses
We modeled the mobility of mobile phone users in order to study the fundamental spreading
patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses …
patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses …