The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2008
DOI: 10.1007/s11036-008-0113-x
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring Smartphones for Anomaly Detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
36
0
5

Year Published

2010
2010
2021
2021

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 94 publications
(42 citation statements)
references
References 10 publications
0
36
0
5
Order By: Relevance
“…A monitor of Symbian OS and Windows Mobile smartphone that extracts features for anomaly detection has, for example, been used to monitor logs and detect normal and infected traffic in [21]. However, this system does not run on a mobile device itself.…”
Section: General Mobile Malware Detection Techniquesmentioning
confidence: 99%
See 1 more Smart Citation
“…A monitor of Symbian OS and Windows Mobile smartphone that extracts features for anomaly detection has, for example, been used to monitor logs and detect normal and infected traffic in [21]. However, this system does not run on a mobile device itself.…”
Section: General Mobile Malware Detection Techniquesmentioning
confidence: 99%
“…According to Cisco, 497 million new mobile devices and connections were sold in 2014 [9]. Other recent reports forecast that mobile-cellular subscriptions will be more than 7bn by the end of 2015 [21]. Market reports also show that since 2012 Google's Android operating system has overtaken other smartphone operating systems and accounted for more than 80% share of market in 2014.…”
Section: Introductionmentioning
confidence: 99%
“…[30] includes framework that consist of a monitoring client, Remote Anomaly Detection System (RADS) and a visualization component in order to monitor smartphones to extract features that can be used in a machine learning algorithm to detect anomalies. A behavior-based malware detection system (pBMDS) is proposed in [31] that use correlation between user's inputs and system calls in order to detect anomalous activities related to SMS/MMS sending. A new service named Kirin security service for Android is described in [33] and [34] that perform lightweight certification of applications to mitigate malware at install time.…”
Section: Malware Detection In Smartphonementioning
confidence: 99%
“…To prevent the rapid depletion of the power source, the monitored data is sent in bulks. The Feature Extractor is triggered to fetch new data every thirty seconds which is stored locally and later, upon reaching a threshold, sent to the server using the appropriate webservice [23]. This data consists of system characteristics that describe all areas of the monitored device.…”
Section: Smartphone System Data Set and Experimentsmentioning
confidence: 99%
“…A detailed survey of the field can be found in [14]. Recently, malicious software detection in smartphones and mobile devices has been a topic of increasing interest [27,7,23,21].…”
Section: Introductionmentioning
confidence: 99%