A survey on security for mobile devices

M La Polla, F Martinelli… - … communications surveys & …, 2012 - ieeexplore.ieee.org
Nowadays, mobile devices are an important part of our everyday lives since they enable us
to access a large variety of ubiquitous services. In recent years, the availability of these …

[图书][B] Network security: A decision and game-theoretic approach

T Alpcan, T Başar - 2010 - books.google.com
Covering attack detection, malware response, algorithm and mechanism design, privacy,
and risk management, this comprehensive work applies unique quantitative models derived …

Recent advances in android mobile malware detection: A systematic literature review

A Alzubaidi - IEEE Access, 2021 - ieeexplore.ieee.org
In recent years, the global pervasiveness of smartphones has prompted the development of
millions of free and commercially available applications. These applications allow users to …

Evaluation of anomaly‐based IDS for mobile devices using machine learning classifiers

D Damopoulos, SA Menesidou… - Security and …, 2012 - Wiley Online Library
Mobile devices have evolved and experienced an immense popularity over the last few
years. This growth however has exposed mobile devices to an increasing number of security …

Malware detection on mobile devices using distributed machine learning

AS Shamili, C Bauckhage… - 2010 20th International …, 2010 - ieeexplore.ieee.org
This paper presents a distributed Support Vector Machine (SVM) algorithm in order to detect
malicious software (malware) on a network of mobile devices. The light-weight system …

Efficient location aware intrusion detection to protect mobile devices

S Yazji, P Scheuermann, RP Dick, G Trajcevski… - Personal and Ubiquitous …, 2014 - Springer
This paper addresses the problem of efficient intrusion detection for mobile devices via
correlating the user's location and time data. We developed two statistical profiling …

A collaborative framework for intrusion detection in mobile networks

M Andreolini, M Colajanni, M Marchetti - Information Sciences, 2015 - Elsevier
Mobile devices are becoming the most popular way of connection, but protocols supporting
mobility represent a serious source of concerns because their initial design did not enforce …

MBotCS: A mobile botnet detection system based on machine learning

X Meng, G Spanoudakis - Risks and Security of Internet and Systems …, 2016 - Springer
As the use of mobile devices spreads dramatically, hackers have started making use of
mobile botnets to steal user information or perform other malicious attacks. To address this …

Characterizing evaluation practices of intrusion detection methods for smartphones

AJ Alzahrani, N Stakhanova… - Journal of Cyber …, 2014 - journals.riverpublishers.com
The appearance of a new Android platform and its popularity has resulted in a sharp rise in
the number of reported vulnerabilities and consequently in the number of mobile threats …

[PDF][PDF] An Integrative method of FTA and FMEA for software security analysis of a smart phone

MH Kim, W Toyib, MG Park - KIPS Transactions on Computer and …, 2013 - academia.edu
Recently software security of the smart phone is an important issue in the field of information
science and technology due to fast propagation of smart technology in our life. The smart …