Research on Operators Mobile Malware Protection Architecture and Key Technologies
In recent years, there is a rapid growth of malware on operators network. It severely threats security of mobile internet. Based on reviewing of existing malware protection technologies, mobile malware protection architecture including both network side and terminal side technology and their interac...
Saved in:
| Main Authors: | Tao Chen, Peng Gao, Xuetao Du, Shan Xue, Manzhi ang |
|---|---|
| Format: | Article |
| Language: | zho |
| Published: |
Beijing Xintong Media Co., Ltd
2014-01-01
|
| Series: | Dianxin kexue |
| Subjects: | |
| Online Access: | http://www.telecomsci.com/zh/article/doi/10.3969/j.issn.1000-0801.2014.01.013/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
I-MCM: IoT Malware Counter Measures for Cross-Architecture IoT Malware Detection
by: Ibrahim Gulatas, et al.
Published: (2025-01-01) -
A Review of the Recent Trends in Mobile Malware Evolution, Detection, and Analysis
by: Seetah Almarri, et al.
Published: (2025-01-01) -
A Robust and Efficient Machine Learning Framework for Enhancing Early Detection of Android Malware
by: Fandi Kurniawan, et al.
Published: (2025-01-01) -
Android malware detection method based on deep neural network
by: Fan CHAO, et al.
Published: (2020-10-01) -
Research on Anti-Trojan Malware Mechanism Based on Characteristic Behavior
by: Weifu Zou, et al.
Published: (2014-11-01)