How to withstand mobile virus attacks, revisited.
Joshua BaronKarim El DefrawyJoshua LampkinsRafail OstrovskyPublished in: PODC (2014)
Keyphrases
- mobile devices
- mobile phone
- countermeasures
- mobile environments
- virus detection
- mobile objects
- handheld devices
- neural network
- m learning
- computer virus
- malicious attacks
- mobile commerce
- context aware
- mobile networks
- mobile computing
- smart phones
- watermarking algorithm
- mobile services
- security mechanisms
- computer security
- attack detection
- malicious users
- mobile technologies
- mobile users