Login / Signup
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques.
Rahul Potharaju
Andrew Newell
Cristina Nita-Rotaru
Xiangyu Zhang
Published in:
ESSoS (2012)
Keyphrases
</>
ddos attacks
defense mechanisms
mobile devices
countermeasures
database
data sets
databases
data mining
artificial intelligence
cooperative
intrusion detection
computer virus