A mobile phone malicious software detection model with behavior checker
There have been cases reported for the new threats from mobile phone technologies and it has raised the awareness among the technology and antivirus vendors. Malicious programs such as Viruses, Trojan, and Worms have been created and targeted at mobile phone. This paper discusses the possible attack...
| Main Authors: | Yap, , TS, Ewe, , HT |
|---|---|
| Format: | Article |
| Published: |
2005
|
| Subjects: | |
| Online Access: | http://shdl.mmu.edu.my/2305/ |
Similar Items
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005)
by: Ho, , CK, et al.
Published: (2005)
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004)
by: Lee, , PS, et al.
Published: (2004)
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005)
by: Ewe, HT, et al.
Published: (2005)
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
by: Heng, Paul Ping Yeow, et al.
Published: (2008)
Mobile Phones: The Intersection of Technology, Policy and Social Issues
by: Manique, Cooray
Published: (2008)
by: Manique, Cooray
Published: (2008)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
A fast motion sensing algorithm for vision based mobile phones user interface design
by: Chang, Yoong Choon, et al.
Published: (2009)
by: Chang, Yoong Choon, et al.
Published: (2009)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Perspectives of Students’ Behavior Towards Mobile
Learning (M-learning) in Egypt: an Extension of the
UTAUT Model
by: Ali, Reham Adel, et al.
Published: (2016)
by: Ali, Reham Adel, et al.
Published: (2016)
An ant algorithm for single-hop wavelength assignment in WDM mesh network
by: Chin, , TS
Published: (2005)
by: Chin, , TS
Published: (2005)
CSE241 – Foundations of Software Engineering
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2021)
A study of nodule detection using Opaque Object Filter
by: Wong, L. P., et al.
Published: (2006)
by: Wong, L. P., et al.
Published: (2006)
Rule-Based Approach For Detecting Advanced Persistent Threat Using Behavioral Features Of Credential Dumping Technique
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
by: Ali Mohamed, Nachaat Abdelatif
Published: (2022)
CPT441- Software Quality Assurance & Testing
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
The Scanning Electron Microscope (SEM) assessment system using the autoregressive (AR) technique
by: Sim,, KS, et al.
Published: (2005)
by: Sim,, KS, et al.
Published: (2005)
CPT341 - SOFTWARE DESIGN & ARCHITECTURE APRIL 2008.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
Protocol Based Interaction in Component-Based Software Systems.
by: Alhazbi, Saleh, et al.
Published: (2007)
by: Alhazbi, Saleh, et al.
Published: (2007)
CPT341 - SOFTWARE DESIGN & ARCHITECTURE JANUARY 2012
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2012)
CPT 341 - SOFTWARE DESIGN & ARCHITECTURE APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CPT341 – Software Design & Architecture January 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
by: PPSKOM, Pusat Pengajian Sains Komputer
Dawn Of The Mobile Malware: Reviewing Mobile Worms .
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Evaluation Of Existing Software For Simulating Of Crowd At Masjid Al-Haram,
by: Sarmady, S., et al.
Published: (2007)
by: Sarmady, S., et al.
Published: (2007)
A Framework For Dynamic Updating In Component-based
Software Systems
by: Mohammed Alhazbi , Saleh
Published: (2009)
by: Mohammed Alhazbi , Saleh
Published: (2009)
CPT243 – Software Requirements Analysis & Modelling June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CPT441 – Software Quality Assurance & Testing June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CPT 243 - Software Requirement Analysis & Modeling June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
CPP301 Software Engineering Practice August/September 1998
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1998)
Performance analysis of grinding process via particle swarm optimization
by: Ting, , TO, et al.
Published: (2005)
by: Ting, , TO, et al.
Published: (2005)
A hybrid ant colony optimization approach (hACO) for constructing load-balanced clusters
by: Ho, C. K., et al.
Published: (2005)
by: Ho, C. K., et al.
Published: (2005)
Robust routing table design for IPv6 lookup
by: Yong, S. M., et al.
Published: (2005)
by: Yong, S. M., et al.
Published: (2005)
A model for secure knowledge sharing
by: Ismail Ahmad,, et al.
Published: (2005)
by: Ismail Ahmad,, et al.
Published: (2005)
CSE441 – Software Process And Quality Assurance
(Proses Dan Jaminan Mutu Perisian)
CPT441 – Software Quality Assurance & Testing
(Jaminan Mutu & Pengujian Perisian)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CPT 311-CPM 312 - SOFTWARE ENGINEERING PRACTICE APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CPT 343 - SOFTWARE PROJECT MANAGEMENT PROCESS & EVOLUTION APRIL 08.
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2008)
CPT243 – SOFTWARE REQUIREMENTS ANALYSIS & MODELLING APR-MAY 2011
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
CIT 502 - OBJECT ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - OKT. 2004
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2004)
CIT 502 - OBJECT ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CIT502 – OBJECT-ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2001
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2001)
CIT502 – OBJECT-ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - SEPT. 2002
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2002)
CIT502 – OBJECT-ORIENTED PROGRAMMING AND SOFTWARE ENGINEERING - OKT. 2003
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2003)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2003)
Similar Items
-
Performance of an ant colony optimization (ACO) algorithm on the dynamic load-balanced clustering problem in ad hoc networks
by: Ho, , CK, et al.
Published: (2005) -
Individual recognition based on human iris using fractal dimension approach
by: Lee, , PS, et al.
Published: (2004) -
An ant colony optimization approach to the degree-constrained minimum spanning tree problem
by: Ewe, HT, et al.
Published: (2005) -
Mobile Phone Use in a Developing Country: A Malaysian Empirical Study
by: Heng, Paul Ping Yeow, et al.
Published: (2008) -
Mobile Phones: The Intersection of Technology, Policy and Social Issues
by: Manique, Cooray
Published: (2008)