Login / Signup

Time and Location Power Based Malicious Code Detection Techniques for Smartphones.

Bryan DixonShivakant MishraJeannette Pepin
Published in: NCA (2014)
Keyphrases
  • malicious code detection
  • power consumption
  • mobile devices
  • data sets
  • mobile applications
  • stream data mining