Tài liệu tham khảo |
Loại |
Chi tiết |
[1] S.-S. C.-Z. S.-C.Tseng, "Security Analysis of Android Applications Detecting Risks of Backdoor Threats," 2011. [Online]. Available:http://www.cse.yzu.edu.tw/project/100035.pdf. [Accessed 12 06 2013] |
Sách, tạp chí |
Tiêu đề: |
Security Analysis of Android Applications Detecting Risks of Backdoor Threats |
|
[2] J. Y. Y. Y. N.F.Huang, "The design and implementation of NIDS rule automatic generating system for HTTP-like bot net detection," TAIS International Conference, 2011 |
Sách, tạp chí |
Tiêu đề: |
The design and implementation of NIDS rule automatic generating system for HTTP-like bot net detection |
|
[4] P. C.-C. S.-C.Lin, "A novel method of mining network flow to detect P2P botnets," Vols. Peer-to-Peer Network. Appl.7, pp. 645-654, 2014 |
Sách, tạp chí |
Tiêu đề: |
A novel method of mining network flow to detect P2P botnets |
|
[5] W. H.-S.Chiang, "Mobile malware behavioral analysis and preventive strategy using ontology," vol. IEEE Second International Conference on Social Computing, pp.1080-1085, 2010 |
Sách, tạp chí |
Tiêu đề: |
Mobile malware behavioral analysis and preventive strategy using ontology |
|
[6] C. J. A.Amamra, "Smartphone malware detection: from a survey towards taxonomy," vol. 7th International Conference on Malicious and Unwanted Software, pp. 79-86, 2012 |
Sách, tạp chí |
Tiêu đề: |
Smartphone malware detection: from a survey towards taxonomy |
|
[7] A. E. M.M.A.Elfattah, "Handsets malware threats and facing techniques," vol. Int. J. Adv. Comput.Sci.Appl.2, pp. 42-48, 2011 |
Sách, tạp chí |
Tiêu đề: |
Handsets malware threats and facing techniques |
|
[8] L.-C. D. L. B. Y. A.Shabtai, "Mobile malware detection through analysis of deviations in application network behavior," vol. Comput. Secur.43, pp. 1-18, 2014 |
Sách, tạp chí |
Tiêu đề: |
Mobile malware detection through analysis of deviations in application network behavior |
|
[9] R.Sangeetha, "Detection of malicious code in user mode," vol. International Conference on Information Communication and Embedded Systems (ICICES), pp.146-149, 2013 |
Sách, tạp chí |
Tiêu đề: |
Detection of malicious code in user mode |
|
[10] C. a. i. affiliates, "The Snort Project," 2014. [Online]. Available: http://manual.snort.org |
Sách, tạp chí |
Tiêu đề: |
The Snort Project |
|
[11] U. Document, "Ubuntu Desktop Guide," [Online]. Available: https://help.ubuntu.com/stable/ubuntu-help/net-wireless-adhoc.html |
Sách, tạp chí |
Tiêu đề: |
Ubuntu Desktop Guide |
|
[12] U. Document, "Ask Ubuntu," [Online]. Available: http://askubuntu.com/questions/307280/how-do-i-install-applications-in-ubuntu |
Sách, tạp chí |
|
[13] Snort, "Snort Document," [Online]. Available: https://www.snort.org/documents |
Sách, tạp chí |
|
[14] Wireshark, "Wireshark Document," [Online]. Available: https://www.wireshark.org/docs/ |
Sách, tạp chí |
Tiêu đề: |
Wireshark Document |
|
[15] "Zimperlich sources," [Online]. Available: http://c-skills.blogspot.com/2011/02/ |
Sách, tạp chí |
Tiêu đề: |
Zimperlich sources |
|
[16] P. S. L. S.-C. &. S. C.-H. Chen, "Simple and effective method for detecting abnormal internet behaviors of mobile devices," vol. Information Sciences, pp. 193- 204, 2015 |
Sách, tạp chí |
Tiêu đề: |
Simple and effective method for detecting abnormal internet behaviors of mobile devices |
|
[17] Y. &. J. X. Zhou, "Dissecting Android malware: Characterization and evolution," Proceedings - IEEE Symposium on Security and Privacy, 2012 |
Sách, tạp chí |
Tiêu đề: |
Dissecting Android malware: Characterization and evolution |
|