Author:
Shabtai Asaf,Kanonov Uri,Elovici Yuval
Subject
Hardware and Architecture,Information Systems,Software
Reference38 articles.
1. A survey about fuzzy cognitive maps papers;Aguilar;International Journal of Computational Cognition,2005
2. Maintaining knowledge about temporal intervals;Allen;Communications of the ACM,1983
3. Bose, A., Hu, X., Shin, K.G., Park, T., 2008. Behavioral detection of malware on mobile handsets. In: Proceeding of the Sixth International Conference on Mobile Systems, Applications, and Services.
4. From desktop to mobile: examining the security experience;Botha;Computer and Security,2009
5. Buennemeyer, T.K. et al., 2008. Mobile device profiling and intrusion detection using smart batteries. International Conference on System Sciences, pp. 296–296.
Cited by
67 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献