Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
Mobile security (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publication
..
year
year of publication
Loading..
author
Loading..
TTÜ department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
2
Look more..
(2/127)
Export
export all inquiry results
(2)
Save TXT fail
Save PDF fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
journal article EST
/
journal article ENG
Concept drift and cross-device behavior : challenges and implications for effective android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Computers & Security
2022
/
art. 102757, 20 p. : ill
https://doi.org/10.1016/j.cose.2022.102757
Journal metrics at Scopus
Article at Scopus
Journal metrics at WOS
Article at WOS
journal article EST
/
journal article ENG
Seotud publikatsioonid
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
2
journal article
Leveraging the first line of defense : a study on the evolution and usage of android security permissions for enhanced android malware detection
Guerra Manzanares, Alejandro
;
Luckner, Marcin
;
Bahsi, Hayretdin
Journal of Computer Virology and Hacking Techniques
2022
/
32 p. : ill
https://doi.org/10.1007/s11416-022-00432-3
journal article
Seotud publikatsioonid
1
Machine learning-based detection and characterization of evolving threats in mobile and IoT Systems = Masinõppepõhine arenevate ohtude tuvastamine ning kirjeldamine mobiilseadmete ja värkvõrkude jaoks
Number of records 2, displaying
1 - 2
keyword
123
1.
Mobile security
2.
autonomous mobile robot
3.
autonomous mobile robots
4.
blockchain mobile
5.
mobile
6.
mobile actuator-sensor networks (MAS-Net)
7.
mobile app
8.
mobile applications
9.
mobile apps
10.
mobile augmented reality
11.
mobile banking
12.
mobile communication
13.
mobile cyber-physical system
14.
mobile fog computing
15.
mobile forensics
16.
mobile genetic elements
17.
mobile hardgrounds
18.
mobile home laboratories
19.
Mobile Laser Scanning
20.
mobile learning
21.
mobile malware
22.
mobile malware detection
23.
Mobile Mapping Systems (MMS)
24.
mobile modem
25.
mobile payment
26.
mobile phone
27.
mobile phone big data
28.
mobile phone data
29.
mobile phone usage data
30.
mobile phones
31.
mobile positioning data
32.
mobile robot
33.
mobile robotics
34.
mobile robots
35.
mobile sensing
36.
mobile smart contracts
37.
mobile-ID
38.
5G mobile communication
39.
5G mobile communication systems
40.
ad-hoc sensor networks security
41.
Blockchain security
42.
cache security
43.
communication system security
44.
comprehensive system of economic security
45.
computer security
46.
cooperative security dilemma
47.
cyber security
48.
cyber security education
49.
cyber security exercises
50.
cyber security strategies
51.
cyber-security
52.
data security
53.
development of security cameras
54.
drinking water security
55.
economic security
56.
economic security of enterprise
57.
emotional security
58.
energy security
59.
energy security indicator
60.
graded security
61.
hardware security
62.
hardware security primitive
63.
human security
64.
information security
65.
internal security
66.
international security
67.
investment and innovation security
68.
IPv6 security
69.
IT security
70.
job security
71.
long-term security
72.
metadata model for security measures
73.
Middle Eastern security
74.
national cyber security strategy
75.
national security
76.
NATO. Science for Peace and Security Program
77.
network security
78.
network security monitoring
79.
OSCE (Organization for Security and Co-operation in Europe)
80.
passenger’s security
81.
policy-based routing security
82.
political and security cultures
83.
post-quantum security
84.
power system security
85.
quantitative security
86.
regional security
87.
security
88.
security and privacy
89.
security and privacy in smart grids
90.
security closure
91.
Security Coverage
92.
security dataset
93.
security dilemma
94.
Security evaluation
95.
security log analysis
96.
security management
97.
security model
98.
security monitoring
99.
security notion
100.
security objectives
101.
security of data
102.
security of supply
103.
security operation center
104.
security patterns
105.
security problem definition
106.
security proof
107.
security protocols
108.
security requirements
109.
security requirements engineering
110.
security risk assessment
111.
security risk management
112.
security strategies
113.
security systems for military objects
114.
security testing
115.
security training
116.
security verification
117.
social security planning
118.
societal security
119.
system of economic security
120.
system security
121.
terrorism security
122.
transmission System Security
123.
voting privacy and security
subject term
4
1.
Mobile Civitatem
2.
Mobile, automüügikeskus
3.
National Computer Security Incident Response Teams (N-CSIRTs)
4.
USS Security Eesti AS
×
vaste
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TTÜ department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TTÜ department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT