Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Mobile security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
3
Look more..
(2/170)
Export
export all inquiry results
(3)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Computers & Security
2022
/
art. 102757, 20 p. : ill
https://doi.org/10.1016/j.cose.2022.102757
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
2
journal article EST
/
journal article ENG
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Journal of Computer Virology and Hacking Techniques
2022
/
32 p. : ill
https://doi.org/10.1007/s11416-022-00432-3
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Related publications
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
3
journal article EST
/
journal article ENG
Machine learning for android malware detection : mission accomplished? a comprehensive review of open challenges and future perspectives
Guerra-Manzanares, Alejandro
Computers and Security
2024
/
art. 103654
https://doi.org/10.1016/j.cose.2023.103654
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Number of records 3, displaying
1 - 3
keyword
166
1.
Mobile security
2.
app-based mobile financial services
3.
autonomous mobile robot
4.
autonomous mobile robots
5.
blockchain mobile
6.
branded mobile apps
7.
gamified mobile apps
8.
IoT and mobile communications
9.
MentSDet mobile application
10.
mobile
11.
mobile actuator-sensor networks (MAS-Net)
12.
mobile app
13.
mobile applications
14.
mobile apps
15.
mobile augmented reality
16.
mobile banking
17.
mobile communication
18.
mobile cyber-physical system
19.
mobile data
20.
mobile fog computing
21.
mobile forensics
22.
mobile genetic elements
23.
mobile ground robots
24.
mobile hardgrounds
25.
mobile home laboratories
26.
Mobile ID
27.
mobile information system
28.
Mobile Laser Scanning
29.
mobile learning
30.
mobile malware
31.
mobile malware detection
32.
Mobile Mapping Systems (MMS)
33.
mobile modem
34.
mobile payment
35.
mobile phone
36.
mobile phone big data
37.
mobile phone data
38.
mobile phone location
39.
mobile phone usage data
40.
mobile phones
41.
mobile positioning
42.
mobile positioning data
43.
mobile robot
44.
mobile robotics
45.
mobile robots
46.
mobile sensing
47.
mobile smart contracts
48.
mobile technologies
49.
mobile-ID
50.
5G mobile communication
51.
5G mobile communication systems
52.
ad-hoc sensor networks security
53.
Automatic Security Verification
54.
Blockchain security
55.
cache security
56.
communication system security
57.
comprehensive system of economic security
58.
computer security
59.
cooperative security dilemma
60.
cyber security
61.
cyber security education
62.
cyber security exercises
63.
cyber security monitoring
64.
cyber security strategies
65.
cyber-security
66.
data and information security
67.
data security
68.
development of security cameras
69.
digital security practices
70.
drinking water security
71.
economic security
72.
economic security of enterprise
73.
emotional security
74.
energy security
75.
energy security indicator
76.
Estonian information security standard
77.
graded security
78.
hardware security
79.
hardware security primitive
80.
high level of security
81.
Homeland security
82.
human security
83.
information security
84.
information security and privacy
85.
initial level of security
86.
internal security
87.
international security
88.
investment and innovation security
89.
IPv6 security
90.
IT security
91.
IT security management
92.
job security
93.
long-term security
94.
medium level of security
95.
metadata model for security measures
96.
Middle Eastern security
97.
national cyber security strategy
98.
national security
99.
NATO. Science for Peace and Security Program
100.
network security
101.
network security monitoring
102.
OSCE (Organization for Security and Co-operation in Europe)
103.
passenger’s security
104.
policy-based routing security
105.
political and security cultures
106.
post-quantum security
107.
power system security
108.
quantitative security
109.
regional security
110.
RISC-V Security Verification
111.
Safety and Security in Sea Transportation
112.
safety and security testing
113.
security
114.
security adaptation
115.
security alert prioritization
116.
security analysis
117.
security and justice (AFSJ)
118.
Security and political science
119.
security and privacy
120.
security and privacy in smart grids
121.
Security Assertion Mining
122.
security closure
123.
Security Coverage
124.
security dataset
125.
security dilemma
126.
Security evaluation
127.
security evaluation instruments
128.
Security limitations
129.
security log analysis
130.
security management
131.
security model
132.
security monitoring
133.
security notion
134.
security objectives
135.
security of data
136.
security of supply
137.
security operation center
138.
security operations center
139.
security patterns
140.
security policy
141.
security problem definition
142.
security proof
143.
security protocols
144.
security requirements
145.
security requirements engineering
146.
security risk assessment
147.
security risk management
148.
security risks
149.
security science and technology
150.
security strategies
151.
security systems for military objects
152.
security testing
153.
security training
154.
security verification
155.
security-by-design
156.
social security planning
157.
societal security
158.
software security
159.
software security level
160.
software security subcharacteristics
161.
sufficient level of security
162.
system of economic security
163.
system security
164.
terrorism security
165.
transmission System Security
166.
voting privacy and security
subject term
4
1.
Mobile Civitatem
2.
Mobile, automüügikeskus
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT