Uri Kanonov | Microsoft - Academia.edu (original) (raw)
Related Authors
University of Nottingham, China Campus
Uploads
Papers by Uri Kanonov
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM'16, 2016
Lecture Notes in Computer Science, 2009
... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for ... more ... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for detecting the malware was defined. The ontology includes five different temporal patterns of potentially malicious behavior: Denial ...
Computing Research Repository, 2009
Google's Android is a comprehensive software framework for mobile communication devices (i.e.... more Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provides a comprehensive security assessment
Journal of Systems and Software, 2010
... View Within Article. Two methods are applicable for defining the domain knowledge and more sp... more ... View Within Article. Two methods are applicable for defining the domain knowledge and more specifically mobile phone security ontology (specializing in detectingmalware). The first method involves the security expert using ...
Journal of Intelligent Information Systems, 2012
... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S... more ... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S ignature-based detection M onitoring power ... Jacoby and Davis (2004) presented a host Battery-Based Intrusion Detection System (B-BID) as a mean of improving mobile device security. ...
IEEE Security & Privacy Magazine, 2000
Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices - SPSM'16, 2016
Lecture Notes in Computer Science, 2009
... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for ... more ... The HIDS employs a light-weight Incremental KBTA detector. A smartphone securityontology for detecting the malware was defined. The ontology includes five different temporal patterns of potentially malicious behavior: Denial ...
Computing Research Repository, 2009
Google's Android is a comprehensive software framework for mobile communication devices (i.e.... more Google's Android is a comprehensive software framework for mobile communication devices (i.e., smartphones, PDAs). The Android framework includes an operating system, middleware and a set of key applications. The incorporation of integrated access services to the Internet on such mobile devices, however, increases their exposure to damages inflicted by various types of malware. This paper provides a comprehensive security assessment
Journal of Systems and Software, 2010
... View Within Article. Two methods are applicable for defining the domain knowledge and more sp... more ... View Within Article. Two methods are applicable for defining the domain knowledge and more specifically mobile phone security ontology (specializing in detectingmalware). The first method involves the security expert using ...
Journal of Intelligent Information Systems, 2012
... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S... more ... processes that are likely to b e b attery-draining attacks. Jacoby and Davis ( 2004 ) H IDS S ignature-based detection M onitoring power ... Jacoby and Davis (2004) presented a host Battery-Based Intrusion Detection System (B-BID) as a mean of improving mobile device security. ...
IEEE Security & Privacy Magazine, 2000