Author:
Zhao Min,Ge Fangbin,Zhang Tao,Yuan Zhijian
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Guo, C., Wang, H., Zhu, W.: Smartphone attacks and defenses. In: HotNets-III, UCSD (November 2004)
2. Racic, R., Ma, D., Chen, H.: Exploiting mms vulnerabilities to stealthily exhause mobile phone’s battery. In: IEEE SecureComm (2006)
3. Lecture Notes in Computer Science;C. Mulliner,2006
4. Mulliner, C., Vigna, G.: Vulnerability analysis of mms user agents. In: Proc. of ACM ACSAC (2006)
5. Forrest, S., Pearlmutter, B.: Detecting instructions using system calls: Alternative data models. In: IEEE Symposium on Security and Privacy (1999)
Cited by
25 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empowering Digital Resilience: SVM Kernel Comparison for Malware Classification to Enhance Security;2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS);2024-06-28
2. Malware Classification to Strengthening Digital Resilience: Comparing SVM Kernel and Logistic Regression;2024 3rd International Conference on Applied Artificial Intelligence and Computing (ICAAIC);2024-06-05
3. Introduction of Android Malware Detection;Android Malware Detection and Adversarial Methods;2024
4. Feature mining and classifier selection for API calls-based malware detection;Applied Intelligence;2023-10-21
5. AndyWar: an intelligent android malware detection using machine learning;Innovations in Systems and Software Engineering;2023-07-06