Export 12 results:[ Author] Title Type Year
Filters: First Letter Of Last Name is M and Author is Jelena Milosevic [Clear All Filters]
"Risk Assessment of Atrial Fibrillation: a Failure Prediction Approach", 41st Computing in Cardiology Conference (CinC), Cambridge, MA, USA, IEEE Computer Society, 09/2014.
"A Resource-optimized Approach to Efficient Early Detection of Mobile Malware", 3rd International Workshop on Security of Mobile Applications - IWSMA 2014, Fribourg, Switzerland, 09/2014.
"Can we Achieve both Privacy Protection and Efficient Malware Detection on Smartphones?", 1st Interdisciplinary Cyber Research Workshop 2015, Tallin, Estona, Tallinn University of Technology, 07/2015.
"A General Practitioner or a Specialist for Your Infected Smartphone?", 36th IEEE Symposium on Security and Privacy , San Jose, CA, USA, IEEE Computer Society Technical Committee on Security and Privacy, 05/2015.
"What Does the Memory Say? Towards the most indicative features for efficient malware detection", CCNC 2016, The 13th Annual IEEE Consumer Communications & Networking Conference, Las Vegas, NV, USA, IEEE Communication Society, 01/2016.
"Security Challenges for Hardware Designers of Mobile Systems", 2015 Mobile Systems Technologies Workshop (MST), May, 2015.
"MalAware: Effective and Efficient Run-time Mobile Malware Detector", The 14th IEEE International Conference on Dependable, Autonomic and Secure Computing (DASC 2016), Auckland, New Zealand, IEEE Computer Society Press, 08/2016.
"A Friend or a Foe? Detecting Malware Using Memory and CPU Features", SECRYPT 2016, 13th International Conference on Security and Cryptography, Lisbon, Portugal, SciTePress Digital Library, 07/2016.
"Trojan Families Identification Using Dynamic Features and Low Complexity Classifiers", 24th EICAR Annual Conference 2016 "Trustworthiness in IT Security Products", Nuremberg, Germany, EICAR, 10/2016.
"Runtime Classification of Mobile Malware for Resource-constrained Devices", Lecture Notes in Communications in Computer and Information Science, vol. 764: Springer International Publishing AG, pp. 195-215, 2017.
"Malware Threats and Solutions for Trustworthy Mobile Systems Design", Hardware Security and Trust: Design and Deployment of Integrated Circuits in a Threatened Environment, First edition; 2016: Springer, pp. 149-167, 2017.
"Time, Accuracy and Power Consumption Tradeoff in Mobile Malware Detection Systems", Computers & Security, vol. 82, pp. 314-328, 05/2019.