MeadDroid: Detecting Monetary Theft Attacks in Android by DVM Monitoring.
Lingguang LeiYuewu WangJiwu JingZhongwen ZhangXingjie YuPublished in: ICISC (2012)
Keyphrases
- identity theft
- malicious activities
- insider threat
- detect malicious
- monitoring system
- mobile devices
- network intrusion detection systems
- real time
- countermeasures
- smart phones
- traffic analysis
- short term
- watermarking scheme
- mobile applications
- security mechanisms
- mobile phone
- attack detection
- data mining
- detecting malicious
- digital images
- android application
- intrusion detection
- malicious attacks
- malware detection
- computer security
- intrusion detection system
- information security