Detecting energy-greedy anomalies and mobile malware variants.
Hahnsang KimJoshua SmithKang G. ShinPublished in: MobiSys (2008)
Keyphrases
- detecting anomalies
- anomaly detection
- mobile devices
- search algorithm
- detect malicious
- mobile environments
- greedy algorithm
- feature selection
- mobile phone
- malware detection
- computing environments
- m learning
- reverse engineering
- context aware
- energy consumption
- low energy
- smart phones
- mobile computing
- mobile networks
- anomalous behavior
- greedy strategy
- detect anomalies
- hill climbing
- network connectivity
- energy efficient
- mobile learning
- graph cuts