Funder
Chongqing Basic Science and Frontier Technology Research Project
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference26 articles.
1. Amopoulos, D., Kambourakis, G., Gritzalis, S., et al. (2012). Exposing mobile malware from the inside (or what is your mobile app really doing?). Peer-to-Peer Networking and Applications. https://doi.org/10.1007/s12083-012-0179-x.
2. Chen, Z., & Kountouris, M. (2016). D2D caching versus small cell caching: Where to cache content in a wireless network? In 2016 IEEE 17th international workshop on signal processing advances in wireless communications (SPAWC), Edinburgh, pp. 1–6.
3. Chengetanai, G. (2018). Minimising black hole attacks to enhance security in wireless mobile ad hoc networks. In 2018 IST-Africa week conference (IST-Africa), (pp. 1–7) Gaborone.
4. Damopoulos, D., Kambourakis, G., & Portokalidis, G. (2014). The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based ids for smartphones. In Proceedings of the 7th European workshop on system security, (pp. 1–6) Amsterdam. https://doi.org/10.1145/2592791.2592797.
5. Damopoulos, D., Menesidou, S. A., Kambourakis, G., Papadaki, M., Clarke, N., & Gritzalis, S. (2011). Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers. Security and Communication Networks. https://doi.org/10.1002/sec.341.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献