Login / Signup
Time and Location Power Based Malicious Code Detection Techniques for Smartphones.
Bryan Dixon
Shivakant Mishra
Jeannette Pepin
Published in:
NCA (2014)
Keyphrases
</>
malicious code detection
power consumption
mobile devices
data sets
mobile applications
stream data mining