Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Mobile security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/138)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Computers & Security
2022
/
art. 102757, 20 p. : ill
https://doi.org/10.1016/j.cose.2022.102757
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
2
journal article EST
/
journal article ENG
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Journal of Computer Virology and Hacking Techniques
2022
/
32 p. : ill
https://doi.org/10.1007/s11416-022-00432-3
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Number of records 2, displaying
1 - 2
keyword
134
1.
Mobile security
2.
app-based mobile financial services
3.
autonomous mobile robot
4.
autonomous mobile robots
5.
blockchain mobile
6.
mobile
7.
mobile actuator-sensor networks (MAS-Net)
8.
mobile app
9.
mobile applications
10.
mobile apps
11.
mobile augmented reality
12.
mobile banking
13.
mobile communication
14.
mobile cyber-physical system
15.
mobile data
16.
mobile fog computing
17.
mobile forensics
18.
mobile genetic elements
19.
mobile hardgrounds
20.
mobile home laboratories
21.
Mobile ID
22.
mobile information system
23.
Mobile Laser Scanning
24.
mobile learning
25.
mobile malware
26.
mobile malware detection
27.
Mobile Mapping Systems (MMS)
28.
mobile modem
29.
mobile payment
30.
mobile phone
31.
mobile phone big data
32.
mobile phone data
33.
mobile phone usage data
34.
mobile phones
35.
mobile positioning
36.
mobile positioning data
37.
mobile robot
38.
mobile robotics
39.
mobile robots
40.
mobile sensing
41.
mobile smart contracts
42.
mobile-ID
43.
5G mobile communication
44.
5G mobile communication systems
45.
ad-hoc sensor networks security
46.
Automatic Security Verification
47.
Blockchain security
48.
cache security
49.
communication system security
50.
comprehensive system of economic security
51.
computer security
52.
cooperative security dilemma
53.
cyber security
54.
cyber security education
55.
cyber security exercises
56.
cyber security strategies
57.
cyber-security
58.
data security
59.
development of security cameras
60.
drinking water security
61.
economic security
62.
economic security of enterprise
63.
emotional security
64.
energy security
65.
energy security indicator
66.
graded security
67.
hardware security
68.
hardware security primitive
69.
human security
70.
information security
71.
internal security
72.
international security
73.
investment and innovation security
74.
IPv6 security
75.
IT security
76.
IT security management
77.
job security
78.
long-term security
79.
metadata model for security measures
80.
Middle Eastern security
81.
national cyber security strategy
82.
national security
83.
NATO. Science for Peace and Security Program
84.
network security
85.
network security monitoring
86.
OSCE (Organization for Security and Co-operation in Europe)
87.
passenger’s security
88.
policy-based routing security
89.
political and security cultures
90.
post-quantum security
91.
power system security
92.
quantitative security
93.
regional security
94.
RISC-V Security Verification
95.
security
96.
security and justice (AFSJ)
97.
security and privacy
98.
security and privacy in smart grids
99.
Security Assertion Mining
100.
security closure
101.
Security Coverage
102.
security dataset
103.
security dilemma
104.
Security evaluation
105.
security log analysis
106.
security management
107.
security model
108.
security monitoring
109.
security notion
110.
security objectives
111.
security of data
112.
security of supply
113.
security operation center
114.
security patterns
115.
security policy
116.
security problem definition
117.
security proof
118.
security protocols
119.
security requirements
120.
security requirements engineering
121.
security risk assessment
122.
security risk management
123.
security strategies
124.
security systems for military objects
125.
security testing
126.
security training
127.
security verification
128.
social security planning
129.
societal security
130.
system of economic security
131.
system security
132.
terrorism security
133.
transmission System Security
134.
voting privacy and security
subject term
4
1.
Mobile Civitatem
2.
Mobile, automüügikeskus
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT