Login / Signup
Exploiting Phone Numbers and Cross-Application Features in Targeted Mobile Attacks.
Srishti Gupta
Payas Gupta
Mustaque Ahamad
Ponnurangam Kumaraguru
Published in:
SPSM@CCS (2016)
Keyphrases
</>
mobile phone
feature extraction
countermeasures
data sets
data mining
low level
image features
co occurrence
feature set
false positives
spatial information
computing environments