共 25 条
[1]
Guo C., Wang H., Zhu W., Smartphone attacks and defenses, HotNets-III, UCSD, (2004)
[2]
Racic R., Ma D., Chen H., Exploiting mms vulnerabilities to stealthily exhause mobile phone's battery, IEEE SecureComm, (2006)
[3]
Mulliner C., Vigna G., Dagon D., Lee W., Using labeling to prevent cross-service attacks against smartphones, DIMVA, (2006)
[4]
Mulliner C., Vigna G., Vulnerability analysis of mms user agents, Proc. of ACM ACSAC, (2006)
[5]
Forrest S., Pearlmutter B., Detecting instructions using system calls: Alternative data models, IEEE Symposium on Security and Privacy, (1999)
[6]
Christodorescu M., Jha S., Et al., Semantic-aware Malware Detection IEEE Symposim of Security and Privacy, (2005)
[7]
Zhu Z., Cao G., Et al., A Social Network Based Patching Scheme for Worm Containment in Cellular Networks Infocomm, (2009)
[8]
Bose A., Xin H., Et al., Behavioral Detection of Malware on Mobile Handsets MobiSys'08, (2008)
[9]
Lewis D., Gale W., A sequential algorithm for training text classifiers, Proceedings of the ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 3-12, (1994)
[10]
Lee W., Dong X., Informatiion-Theoretic Measures for Anomaly Detection[A], Proc of the 2001 IEEE Symp on Security and Privacy[C], pp. 130-143, (2001)

