Assessment of Palm OS Susceptibility to Malicious Code Threats.
Tom GoovaertsBart De WinBart De DeckerWouter JoosenPublished in: Communications and Multimedia Security (2005)
Keyphrases
- malicious code
- static analysis
- operating system
- reverse engineering
- network traffic
- virtual machine
- cyber security
- information security
- open source
- malicious behavior
- metadata
- countermeasures
- security issues
- databases
- computer security
- db universal database
- denial of service attacks
- dynamic analysis
- database manager
- palmprint
- intrusion detection
- computer systems
- text classification
- information systems
- data mining