A. Amamra, C. Talhi, and J. Robert, Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp.329-334
DOI : 10.1109/BWCCA.2012.61

A. Amamra, C. Talhi, and J. Robert, Smartphone malware detection: From a survey towards taxonomy, 2012 7th International Conference on Malicious and Unwanted Software, pp.89-96
DOI : 10.1109/MALWARE.2012.6461012

A. Bose, X. Hu, K. G. Shin, and T. Park, Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.225-238
DOI : 10.1145/1378600.1378626

A. Shabtai, U. Kanonov, Y. Elovici, C. Glezer, and Y. Weiss, ???Andromaly???: a behavioral malware detection framework for android devices, Journal of Intelligent Information Systems, vol.3597, issue.4, pp.38-161, 2011.
DOI : 10.1007/s10844-010-0148-x

L. Xie and X. Zhang, pBMDS, Proceedings of the third ACM conference on Wireless network security, WiSec '10, pp.37-48
DOI : 10.1145/1741866.1741874

M. Zhao, RobotDroid: A Lightweight Malware Detection Framework On Smartphones, Journal of Networks, vol.7, issue.4, 2012.
DOI : 10.4304/jnw.7.4.715-722

URL : http://doi.org/10.4304/jnw.7.4.715-722

I. Burguera, U. Zurutuza, and S. Nadjm-tehrani, Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11
DOI : 10.1145/2046614.2046619

A. Amamra, C. Talhi, J. Robert, and M. Hamiche, Enhancing Smartphone Malware Detection Performance by Applying Machine Learning Hybrid Classifiers, ASEA2012, pp.131-137
DOI : 10.1007/978-3-642-35267-6_17

. Wang, Fine-grained power modeling for smartphones using system call tracing, EuroSys112011, pp.153-168

R. C. Dunning, J. G. Marchany, and . Tront, Mobile Device Profiling and Intrusion Detection using Smart Batteries Available from: https://www.kernel.org/pub Available from: https://play.google.com/store, HICSS 20082008: Waikoloa, Hawaii. p. 296. 11. Organization, L.K. Linux 2.6 System calls Table 15. Srinivas Mukkamala, Guadalupe Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines International Joint Conference on Neural Networks2002, pp.1702-1707, 2012.

S. Nahla-ben-amor, Z. Benferhat, and . Elouedi, Naive Bayes vs Decision Trees in Intrusion Detection Systems, Symposium on Applied Computing2004, pp.420-424