:::

詳目顯示

回上一頁
題名:開放資料應用於行動惡意程式分析研究
書刊名:電子商務研究
作者:陳嘉玫 引用關係江玟璟歐雅惠 引用關係
作者(外文):Chen, Chia-meiChiang, Wen-chingOu, Ya-hui
出版日期:2014
卷期:12:3
頁次:頁319-335
主題關鍵詞:開放資料行為分析行動裝置惡意軟體敏感性資料Open dataBehaviors analysisMobile deviceMalwareSensitively data
原始連結:連回原系統網址new window
相關次數:
  • 被引用次數被引用次數:期刊(3) 博士論文(0) 專書(0) 專書論文(0)
  • 排除自我引用排除自我引用:2
  • 共同引用共同引用:0
  • 點閱點閱:12
期刊論文
1.Kazemi, S.、Abghari, S.、Lavesson, N.、Johnson, H.、Ryman, P.(2013)。Open data for anomaly detection in maritime surveillance。Expert System with Applications,40,5719-5729。  new window
2.Lakomaa, E.、Kallberg, J.(2013)。Open data as a foundation for innovation: The enabling effect of free public sector information for entrepreneurs。Access IEEE,1,558-563。  new window
3.Jappinen, S.、Toivonen, T.、Salonen, M.(2013)。Modeling the potential effect of shared bicycles on public transport travel times in greater helsinki: An open data approach。Applied Geography,43,13-24。  new window
4.Yerima, S. Y.、Sezer, S.、McWilliams, G.(2014)。Analysis of bayesian classification-based approaches for android malware detection。IET Information Security,8(1),25-36。  new window
會議論文
1.Yerima, S. Y.、Sezer, S.、McWilliams, G.、Muttik, I.(2013)。A new android malware detection approach using bayesian classification。2013 IEEE 27th International Conference on Advanced Information Networking and Applications。IEEE Computer Society。121-128。  new window
2.Wu, D. J.、Mao, C. H.、Wei, T. E.、Lee, H. M.、Wu, K. P.(2012)。Droidmat: Android malware detection through manifest and api calls tracing。Information Security (Asia JCIS), 2012 Seventh Asia Joint Conference。  new window
3.Bläsing, T.、Batyuk, L.、Schmidt, A. -D.、Camtepe, S. A.、Albayrak, S.(2010)。An android application sandbox system for suspicious software detection。5th International Conference on Malicious and Unwanted Software。IEEE Conference Publications。55-62。  new window
4.Enck, W.、Gilbert, P.、Chun, B. G.、Cox, L. P.、Jung, J.、McDaniel, P.、Sheth, A. N.(2010)。Taintdroid: An information-flow tracking system for real time privacy monitoring on smartphones。9th USENIX conference on Operating systems design and implementation。USENIX Association。1-6。  new window
5.Burguera, I.、Zurutuza, U.、Tehrani, S.(2011)。Crowdroid: Behavior-based malware detection system for android。1st ACM workshop on Security and privacy in smartphones and mobile devices。ACM。15-26。  new window
6.Sarma, B.、Li, N.、Gates, C.、Potharaju, R.、Nita-Rotaru, C.(2012)。Android permissions: A perspective combining risks and benefits。17th ACM symposium on Access Control Models and Technologies,13-22。  new window
其他
1.Spreitzenbarth, M.(2013)。Current Android Malware,http://forensics.spreitzenbarth.de/android-malware/, 2014/08/22。  new window
2.McAfee(2014)。McAfee threats report: first quarter 2013,http://www.mcafee.com/uk/resources/reports/rp-quarterly-threat-q1- 2013.pdf, 2014/01/15。  new window
3.Donova, T.(2013)。Nearly 100% of mobile malware attacks in 2013 targeted android devices,http://www.businessinsider.com/nearly-all-mobile-malware-in-2013-targeted-android-devices-2014-1, 2014/01/15。  new window
4.F-Security(2014)。Threat Report H1 2013,http://www.f-secure.com/static/doc/labs_global/Research/Threat_Report_H1_2013.pdf。  new window
5.趨勢科技(2013)。網路危機--報告:高風險手機應用程式,六成會收集作業系統、GPS定位等資訊,http://blog.trendmicro.com.tw/?p=6413。  延伸查詢new window
6.Wiki(2014)。Open Data,http://en.wikipedia.org/ wiki/Open_data, 2014/08/22。  new window
7.Intrepidus group(2011)。Androidaudittools: Dynamic android analysis tools,http://intrepidusgroup.com/insight/2011/05/androidaudittools/, 2014/08/22。  new window
8.Google-Android Developers(2013)。Managing Virtual Devices,http://developer.android.com/tools/devices/index.html, 2014/08/22。  new window
9.Android Developers(2013)。Logcat,http://developer.android.com/tools/help/logcat.html, 2014/08/22。  new window
圖書論文
1.Shabtai, A.、Elovici, Y.(2010)。Applying behavioral detection on android-based devices。Mobile Wireless Middleware, Operating Systems, and Applications。Berlin:Heidelberg:Springer。  new window
2.Cerbo, F. Di.、Girardello, A.、Michahelles, F.、Voronkova, S.(2011)。Detection Of Malicious Applications On Android OS。Computational Forensics。Berlin:Heidelberg:Springer。  new window
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
QR Code
QRCODE