Abstract | ||
---|---|---|
Smartphone platforms are becoming increasingly complex, which gives way to software vulnerabilities difficult to identify and that might allow malware developers to gain unauthorised privileges through technical exploitation. However, the authors maintain that these types of attacks indirectly renders a number of unexpected behaviours in the system that can be profiled. In this work, the authors p... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1049/iet-ifs.2017.0460 | IET Information Security |
Keywords | Field | DocType |
computer crime,computer network security,invasive software,program diagnostics,smart phones | Information system,Normality,Android (operating system),Computer science,Computer security,Network security,Computer network,Exploit,Software,Component-based software engineering,Malware | Journal |
Volume | Issue | ISSN |
12 | 5 | 1751-8709 |
Citations | PageRank | References |
0 | 0.34 | 0 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Guillermo Suarez-Tangil | 1 | 180 | 12.44 |
Santanu Kumar Dash | 2 | 88 | 7.77 |
Pedro García-Teodoro | 3 | 214 | 18.28 |
Jose A. Camacho | 4 | 58 | 7.98 |
Lorenzo Cavallaro | 5 | 886 | 52.85 |