Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
mobile malware detection (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/178)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book article
Differences in Android behavior between real device and emulator : a malware detection perspective
Guerra Manzanares, Alejandro
;
Bahsi, Hayretdin
;
Nõmm, Sven
6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, October 22-25, 2019
2019
/
art. 8939268, p. 399-404
https://doi.org/10.1109/IOTSMS48152.2019.8939268
book article
Number of records 1, displaying
1 - 1
keyword
176
1.
mobile malware detection
2.
mobile malware
3.
malware detection
4.
android malware
5.
malware analysis
6.
Malware behavior
7.
Malware characterization
8.
Malware evolution
9.
malware reverse engineering
10.
app-based mobile financial services
11.
autonomous mobile robot
12.
autonomous mobile robots
13.
blockchain mobile
14.
branded mobile apps
15.
gamified mobile apps
16.
IoT and mobile communications
17.
MentSDet mobile application
18.
mobile
19.
mobile actuator-sensor networks (MAS-Net)
20.
mobile app
21.
mobile applications
22.
mobile apps
23.
mobile augmented reality
24.
mobile banking
25.
mobile communication
26.
mobile cyber-physical system
27.
mobile data
28.
mobile fog computing
29.
mobile forensics
30.
mobile genetic elements
31.
mobile ground robots
32.
mobile hardgrounds
33.
mobile home laboratories
34.
Mobile ID
35.
mobile information system
36.
Mobile Laser Scanning
37.
mobile learning
38.
Mobile Mapping Systems (MMS)
39.
mobile modem
40.
mobile payment
41.
mobile phone
42.
mobile phone big data
43.
mobile phone data
44.
mobile phone location
45.
mobile phone usage data
46.
mobile phones
47.
mobile positioning
48.
mobile positioning data
49.
mobile robot
50.
mobile robotics
51.
mobile robots
52.
Mobile security
53.
mobile sensing
54.
mobile smart contracts
55.
mobile technologies
56.
mobile-ID
57.
5G mobile communication
58.
5G mobile communication systems
59.
amoxicillin detection
60.
anomaly detection
61.
anomaly detection for system logs
62.
antibiotic detection
63.
antibiotics detection
64.
aspect detection
65.
asynchronous fault detection
66.
attack detection
67.
barotrauma detection system
68.
Barotrauma detection system sensors
69.
behaviour-based intrusion detection systems
70.
body detection
71.
botnet detection
72.
capacitively coupled conductivity detection
73.
change detection
74.
chemical detection
75.
community detection
76.
compu ter-aided detection(CAD)
77.
computer-aided detection
78.
computer‐aided detection
79.
contactless conductivity detection
80.
contactless conductivity detection (C4D)
81.
crack detection
82.
crash detection
83.
cyber intrusion detection
84.
defect detection
85.
detection
86.
detection efficiency
87.
detection engineering
88.
detection mechanisms
89.
detection method
90.
detection methods
91.
detection of anomalous end user nodes
92.
detection of hydrogen isotopes
93.
distributed detection
94.
early detection
95.
early intrusion detection
96.
energy detection
97.
error detection
98.
ESI-MS and IM detection
99.
evaluation of explainable AI intrusion detection
100.
Event detection
101.
extraction and detection methods
102.
face detection
103.
Face Manipulation Detection
104.
failure detection
105.
fall detection
106.
fault detection
107.
fault detection and diagnoses
108.
fault detection and diagnosis
109.
Fish detection
110.
fouling detection
111.
harmonic detection
112.
health care IoMT intrusion detection
113.
hepatitis C virus (HCV) detection
114.
hubs detection
115.
IED detection
116.
image-based crack detection
117.
indicident detection and response
118.
indirect UV absorbance detection
119.
intrusion detection
120.
intrusion detection system
121.
intrusion detection system (IDS)
122.
intrusion detection systems
123.
island detection
124.
islanding detection
125.
label-free detection
126.
lane detection
127.
lane line detection
128.
LED fluorescence detection
129.
leg detection
130.
light detection and ranging
131.
light detection and ranging (LiDAR)
132.
Light Detection and Ranging (LiDAR) point cloud
133.
limit of detection
134.
lock-in detection
135.
loop-closure detection
136.
marker detection
137.
money laundering detection systems
138.
monitoring and detection
139.
multi-classed object detection
140.
Multi-valued Simulation for Hazard Detection in Digital Circuits
141.
mutant detection
142.
network anomaly detection
143.
network intrusion detection system
144.
nodules detection
145.
object detection
146.
oil-spill detection
147.
outlier’s detection methods
148.
outliers detection
149.
peak detection
150.
phytoplankton detection methods
151.
plagiarism detection
152.
position detection
153.
precursor detection
154.
propaganda detection
155.
protein detection
156.
proton detection
157.
radar detection
158.
ramp event detection
159.
recycled FPGA detection
160.
residual current detection
161.
robust detection
162.
scene text detection
163.
short-circuit detection
164.
Side-Channel Attack Detection
165.
small molecule detection
166.
speech activity detection
167.
Suicidal ideation detection
168.
synchronous detection
169.
topic detection
170.
tyre detection
171.
unmanned aerial vehicle detection systems
172.
unsupervised outlier detection
173.
UV detection
174.
vehicle detection
175.
vortex detection
176.
3D lane detection
subject term
2
1.
Mobile Civitatem
2.
Mobile, automüügikeskus
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT