Mobile malware

Results: 423



#Item
41Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Dissecting Android Malware: Characterization and Evolution Yajin Zhou Department of Computer Science North Carolina State University yajin

Add to Reading List

Source URL: yajin.org

Language: English
42Samsung_Research_America2줄_기본형

Samsung_Research_America2줄_기본형

Add to Reading List

Source URL: www.compugraf.com.br

Language: English - Date: 2016-05-13 14:45:31
43MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

MAIK MORGENSTERN / CTO AV-TEST AVAR CONFRENCE 2015 YOU ARE THE TARGET IN THE IOT

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2016-04-18 07:40:14
44Table of Contents  7 8 Table of Contents

Table of Contents 7 8 Table of Contents

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:58:34
45WEBROOT CUSTOMER CASE STUDY » MICROAGE  MicroAge Partners with Webroot to Deliver Cloud-based Mobile Security BACKGROUND

WEBROOT CUSTOMER CASE STUDY » MICROAGE MicroAge Partners with Webroot to Deliver Cloud-based Mobile Security BACKGROUND

Add to Reading List

Source URL: webroot-cms-cdn.s3.amazonaws.com

Language: English - Date: 2016-02-25 11:51:21
46Mobile Exploit Intelligence Project 	
   Dan	
  Guido,	
  Trail	
  of	
  Bits	
   Mike	
  Arpaia,	
  iSEC	
  Partners	
   	
   Blackberry,	
  	
  

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
47Mobile Exploit Intelligence Project 	
   Dan	
  Guido,	
  Trail	
  of	
  Bits	
   Mike	
  Arpaia,	
  iSEC	
  Partners	
   	
   ShakaCon,	
  	
  

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     ShakaCon,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
48Evaluating the threat of epidemic mobile malware Christian Szongott, Benjamin Henne, Matthew Smith Distributed Computing & Security Group Gottfried Wilhelm Leibniz University of Hannover Email: {szongott,henne,smith}@dcs

Evaluating the threat of epidemic mobile malware Christian Szongott, Benjamin Henne, Matthew Smith Distributed Computing & Security Group Gottfried Wilhelm Leibniz University of Hannover Email: {szongott,henne,smith}@dcs

Add to Reading List

Source URL: www.dcsec.uni-hannover.de

Language: English - Date: 2012-10-22 10:03:52
    49AdDroid: Privilege Separation for Applications and Advertisers in Android Paul Pearce, Adrienne Porter Felt Computer Science Division University of California Berkeley

    AdDroid: Privilege Separation for Applications and Advertisers in Android Paul Pearce, Adrienne Porter Felt Computer Science Division University of California Berkeley

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2014-02-17 17:32:41
    50Compact Explanation of Why Malware is Bad Speaker: Wei Chen1 Joint Work with Charles Sutton1 , David Aspinall1 , Andrew D. Gordon1,2 , Igor Muttik3 , and Qi Shen4 App Guarden Project

    Compact Explanation of Why Malware is Bad Speaker: Wei Chen1 Joint Work with Charles Sutton1 , David Aspinall1 , Andrew D. Gordon1,2 , Igor Muttik3 , and Qi Shen4 App Guarden Project

    Add to Reading List

    Source URL: www.ai4fm.org

    Language: English - Date: 2015-09-02 07:29:35