Cannabis Ruderalis

The evolution of android malware and android analysis techniques

K Tam, A Feizollah, NB Anuar, R Salleh… - ACM Computing …, 2017 - dl.acm.org
With the integration of mobile devices into daily life, smartphones are privy to increasing
amounts of sensitive information. Sophisticated mobile malware, particularly Android …

A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

Crowdroid: behavior-based malware detection system for android

I Burguera, U Zurutuza, S Nadjm-Tehrani - … of the 1st ACM workshop on …, 2011 - dl.acm.org
The sharp increase in the number of smartphones on the market, with the Android platform
posed to becoming a market leader makes the need for malware analysis on this platform an …

On lightweight mobile phone application certification

W Enck, M Ongtang, P McDaniel - … of the 16th ACM conference on …, 2009 - dl.acm.org
Users have begun downloading an increasingly large number of mobile phone applications
in response to advancements in handsets and wireless networks. The increased number of …

“Andromaly”: a behavioral malware detection framework for android devices

A Shabtai, U Kanonov, Y Elovici, C Glezer… - Journal of Intelligent …, 2012 - Springer
This article presents Andromaly—a framework for detecting malware on Android mobile
devices. The proposed framework realizes a Host-based Malware Detection System that …

Machine learning aided Android malware classification

N Milosevic, A Dehghantanha, KKR Choo - Computers & Electrical …, 2017 - Elsevier
The widespread adoption of Android devices and their capability to access significant
private and confidential information have resulted in these devices being targeted by …

Apex: extending android permission model and enforcement with user-defined runtime constraints

M Nauman, S Khan, X Zhang - Proceedings of the 5th ACM symposium …, 2010 - dl.acm.org
Android is the first mass-produced consumer-market open source mobile platform that
allows developers to easily create applications and users to readily install them. However …

Privacy protection for preventing data over-collection in smart city

Y Li, W Dai, Z Ming, M Qiu - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
In smart city, all kinds of users' data are stored in electronic devices to make everything
intelligent. A smartphone is the most widely used electronic device and it is the pivot of all …

A survey on machine learning in Internet of Things: Algorithms, strategies, and applications

S Messaoud, A Bradai, SHR Bukhari, PTA Quang… - Internet of Things, 2020 - Elsevier
In the IoT and WSN era, large number of connected objects and sensing devices are
dedicated to collect, transfer, and generate a huge amount of data for a wide variety of fields …

Understanding the spreading patterns of mobile phone viruses

P Wang, MC González, CA Hidalgo, AL Barabási - Science, 2009 - science.org
We modeled the mobility of mobile phone users in order to study the fundamental spreading
patterns that characterize a mobile virus outbreak. We find that although Bluetooth viruses …

Leave a Reply