Mostrar el registro sencillo del ítem

Artículo

dc.creatorOrtega Ramírez, Juan Antonioes
dc.creatorFuentes Brenes, Danieles
dc.creatorÁlvarez García, Juan Antonioes
dc.creatorGonzález Abril, Luises
dc.creatorVelasco Morente, Franciscoes
dc.date.accessioned2016-09-02T12:01:53Z
dc.date.available2016-09-02T12:01:53Z
dc.date.issued2011
dc.identifier.citationOrtega Ramírez, J.A., Fuentes Brenes, D., Álvarez García, J.A., González Abril, L. y Velasco Morente, F. (2011). A Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Services. KSII Transactions on Internet and Information Systems, 5 (8), 1457-1471.
dc.identifier.issn1976-7277es
dc.identifier.urihttp://hdl.handle.net/11441/44684
dc.description.abstractA method to detect Trojan horses in messaging and Bluetooth in mobile phones by means of monitoring the events produced by the infections is presented in this paper. The structure of the detection approach is split into two modules: the first is the Monitoring module which controls connection requests and sent/received files, and the second is the Graphical User module which shows messages and, under suspicious situations, reports the user about a possible malware. Prototypes have been implemented on different mobile operating systems to test its feasibility on real cellphone malware. Experimental results are shown to be promising since this approach effectively detects various known malwarees
dc.description.sponsorshipMinisterio de Ciencia e Innovación TIN2009-14378-C02-01es
dc.formatapplication/pdfes
dc.language.isoenges
dc.publisherKorean Society for Internet Informationes
dc.relation.ispartofKSII Transactions on Internet and Information Systems, 5 (8), 1457-1471.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 Internacional*
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/*
dc.subjectSecurityes
dc.subjectmobile deviceses
dc.subjectmobile malwarees
dc.subjectspywarees
dc.titleA Novel Approach to Trojan Horse Detection in Mobile Phones Messaging and Bluetooth Serviceses
dc.typeinfo:eu-repo/semantics/articlees
dcterms.identifierhttps://ror.org/03yxnpp24
dc.type.versioninfo:eu-repo/semantics/publishedVersiones
dc.rights.accessRightsinfo:eu-repo/semantics/openAccesses
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Economía Aplicada Ies
dc.contributor.affiliationUniversidad de Sevilla. Departamento de Lenguajes y Sistemas Informáticoses
dc.relation.projectIDTIN2009-14378-C02-01es
dc.relation.publisherversionhttp://itiis.org/digital-library/manuscript/218es
dc.identifier.doi10.3837/tiis.2011.08.006es
idus.format.extent15 p.es
dc.journaltitleKSII Transactions on Internet and Information Systemses
dc.publication.volumen5es
dc.publication.issue8es
dc.publication.initialPage1457es
dc.publication.endPage1471es
dc.identifier.idushttps://idus.us.es/xmlui/handle/11441/44684
dc.contributor.funderMinisterio de Ciencia e Innovación (MICIN). España

FicherosTamañoFormatoVerDescripción
a novel approach to trojan horse ...546.6KbIcon   [PDF] Ver/Abrir  

Este registro aparece en las siguientes colecciones

Mostrar el registro sencillo del ítem

Attribution-NonCommercial-NoDerivatives 4.0 Internacional
Excepto si se señala otra cosa, la licencia del ítem se describe como: Attribution-NonCommercial-NoDerivatives 4.0 Internacional