Performance Evaluation of Multi-pattern Matching Algorithms on Smartphone, 2012 Seventh International Conference on Broadband, Wireless Computing, Communication and Applications, pp.329-334 ,
DOI : 10.1109/BWCCA.2012.61
Smartphone malware detection: From a survey towards taxonomy, 2012 7th International Conference on Malicious and Unwanted Software, pp.89-96 ,
DOI : 10.1109/MALWARE.2012.6461012
Behavioral detection of malware on mobile handsets, Proceeding of the 6th international conference on Mobile systems, applications, and services, MobiSys '08, pp.225-238 ,
DOI : 10.1145/1378600.1378626
???Andromaly???: a behavioral malware detection framework for android devices, Journal of Intelligent Information Systems, vol.3597, issue.4, pp.38-161, 2011. ,
DOI : 10.1007/s10844-010-0148-x
pBMDS, Proceedings of the third ACM conference on Wireless network security, WiSec '10, pp.37-48 ,
DOI : 10.1145/1741866.1741874
RobotDroid: A Lightweight Malware Detection Framework On Smartphones, Journal of Networks, vol.7, issue.4, 2012. ,
DOI : 10.4304/jnw.7.4.715-722
URL : http://doi.org/10.4304/jnw.7.4.715-722
Crowdroid, Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices, SPSM '11 ,
DOI : 10.1145/2046614.2046619
Enhancing Smartphone Malware Detection Performance by Applying Machine Learning Hybrid Classifiers, ASEA2012, pp.131-137 ,
DOI : 10.1007/978-3-642-35267-6_17
Fine-grained power modeling for smartphones using system call tracing, EuroSys112011, pp.153-168 ,
Mobile Device Profiling and Intrusion Detection using Smart Batteries Available from: https://www.kernel.org/pub Available from: https://play.google.com/store, HICSS 20082008: Waikoloa, Hawaii. p. 296. 11. Organization, L.K. Linux 2.6 System calls Table 15. Srinivas Mukkamala, Guadalupe Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines International Joint Conference on Neural Networks2002, pp.1702-1707, 2012. ,
Naive Bayes vs Decision Trees in Intrusion Detection Systems, Symposium on Applied Computing2004, pp.420-424 ,