Propagation , Detection and Containment of Mobile Malware

@inproceedings{Bose2008PropagationD,
  title={Propagation , Detection and Containment of Mobile Malware},
  author={Abhijit Bose},
  year={2008}
}
Propagation, Detection and Containment of Mobile Malware 
Highly Cited
This paper has 18 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 14 extracted citations

Investigating clustering algorithm DBSCAN to self select locations for power based malicious code detection on smartphones

2017 Third International Conference on Mobile and Secure Services (MobiSecServ) • 2017
View 1 Excerpt

Exploiting altruism in social networks for friend-to-friend malware detection

2014 IEEE Conference on Communications and Network Security • 2014
View 1 Excerpt

Research in Progress - Defending Android Smartphones from Malware Attacks

2013 Third International Conference on Advanced Computing and Communication Technologies (ACCT) • 2013
View 1 Excerpt

Time and Location Power Based Malicious Code Detection Techniques for Smartphones

2014 IEEE 13th International Symposium on Network Computing and Applications • 2013
View 1 Excerpt

Worm Propagation Model for Heterogeneous Network

2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery • 2012
View 2 Excerpts

References

Publications referenced by this paper.
Showing 1-10 of 103 references

Modeling epidemic spreading in mobile environments

Workshop on Wireless Security • 2005
View 10 Excerpts
Highly Influenced

Primary response technical white paper

S. Hofmeyr, M. Williamson
Sana Security, • 2005
View 9 Excerpts
Highly Influenced

Semantics-aware malware detection

M.Christodorescu, S.Jha, S.A.Seshia, D.Song, R.E.Bryant
InProceedings of the IEEE Symposium on Security and Privacy , • 2005
View 8 Excerpts
Highly Influenced

Worm anatomy and model

WORM • 2003
View 7 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…