Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Detection of Mobile Malware in the Wild

Published: 01 September 2012 Publication History

Abstract

New techniques for detecting the presence of mobile malware can help protect smartphones from potential security threats.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Computer
Computer  Volume 45, Issue 9
September 2012
102 pages

Publisher

IEEE Computer Society Press

Washington, DC, United States

Publication History

Published: 01 September 2012

Author Tags

  1. mobile malware detection
  2. mobile security
  3. smartphone protection

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)HEMDNeural Computing and Applications10.1007/s00521-017-2914-y30:11(3353-3361)Online publication date: 1-Dec-2018
  • (2016)CREDROIDProceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing10.1145/2940343.2940348(28-36)Online publication date: 5-Jul-2016
  • (2016)Improving Security Awareness in the Government SectorProceedings of the 17th International Digital Government Research Conference on Digital Government Research10.1145/2912160.2912186(1-7)Online publication date: 8-Jun-2016
  • (2016)Research on android malware permission pattern using permission monitoring systemMultimedia Tools and Applications10.1007/s11042-016-3273-x75:22(14807-14817)Online publication date: 1-Nov-2016
  • (2015)Dynamic VSAEngineering Applications of Artificial Intelligence10.1016/j.engappai.2015.05.00844:C(111-122)Online publication date: 1-Sep-2015
  • (2015)Guess who is listening in to the board meetingSecurity and Communication Networks10.1002/sec.12058:16(2813-2825)Online publication date: 10-Nov-2015
  • (2014)Current Trends and the Future of Metamorphic Malware DetectionProceedings of the 7th International Conference on Security of Information and Networks10.1145/2659651.2659670(411-416)Online publication date: 9-Sep-2014
  • (2014)Storms in mobile networksProceedings of the 10th ACM symposium on QoS and security for wireless and mobile networks10.1145/2642687.2642688(119-126)Online publication date: 21-Sep-2014
  • (2014)The company you keepProceedings of the 23rd international conference on World wide web10.1145/2566486.2568046(39-50)Online publication date: 7-Apr-2014

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media