[1]
J. Jamaluddin, N. Zotou, and P. Coulton, in: Proceedings of the IEEE International Symposium on Consumer Electronics, pp.199-202, 2004.
Google Scholar
[2]
Information on http://www.informationweek.com/news/security/attacks/228200648.
Google Scholar
[3]
Information on http://www.cellular-news.com/story/54544.php.
Google Scholar
[4]
Information on http://www.juniper.net/us/en/local/pdf/additional-resources/jnpr-2011-mobile- threats-report.pdf.
Google Scholar
[5]
Information on http://www.f-secure.com/en/web/labs_global/2004-threat-summary.
Google Scholar
[6]
Information on http://www.securelist.com/en/analysis?pubid=201225789.
Google Scholar
[7]
Information on http://www.securelist.com/en/analysis?pubid=200119916.
Google Scholar
[8]
D. Shih, B. Lin, H. Chiang, and M. Shih, Industrial Management & Data Systems, Vol. 108, No. 4, pp.478-494, 2008.
DOI: 10.1108/02635570810868344
Google Scholar
[9]
M. Hypponen, "Mobile Security Review September 2010," F-Secure Labs, HelsinkiFinland, Technical Report, September 2010.
Google Scholar
[10]
A. D. Schmidt and S. Albayrak, "Malicious Software for Smartphones," Technische Universit¨at Berlin - DAI-Labor, Tech. Rep. TUBDAI 02/08-01, February 2008, http://www.dai-labor.de.
Google Scholar
[11]
M. L. Polla, F. Martinelli, and D. Sgandurra, Accepted by IEEE Communications Survey & Tutorials, 2012.
Google Scholar
[12]
Information on http://www.securelist.com/en/analysis/204792100/Kaspersky_Security_ Bulletin_2009_Malware_Evolution_2009.
Google Scholar
[13]
Information on http://www.securelist.com/en/analysis/204792217/Kaspersky_Security_ Bulletin_Malware_Evolution_2011.
Google Scholar
[14]
Information on http://www.informationweek.com/news/mobility/security/232601868.
Google Scholar
[15]
Information on http://techministries. org/downloads/Malware.pdf.
Google Scholar
[16]
S. Peng and G. Wang, in: Proceeding of IEEE TrustCom, Changsha, China, pp.282-287, November 2011.
Google Scholar
[17]
S. Peng, G. Wang, and S. Yu, Accepted by Elsevier's Journal of Computer and System Sciences, 2012.
Google Scholar
[18]
A. Bose and K. G. Shin, In: Proceeding of ACM WiSe, Los Angeles, California, USA, pp.95-104, September 2006.
Google Scholar
[19]
L. Xie, H. Song, T. Jaeger, and S. Zhu, in: Proceeding of WWW, 1083-1084, April 2008.
Google Scholar
[20]
L. Xie, X. Zhang, A. Chaugule, T. Jaeger, and S. Zhu. In: Proceeding of IEEE SRDS, New York, USA, pp.83-90, 2009.
Google Scholar
[21]
G. Zyba, G. M. Voelker, M. Liljenstam, A. M´ehes, and P. Johansson, in: Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, pp.1503-1511, April 2009.
Google Scholar
[22]
Z. Zhu, G. Cao, S. Zhu, S. Ranjany, and A. Nucciy, in: Proceedings of IEEE INFOCOM, Rio de Janeiro, Brazil, pp.1476-1484, April 2009.
Google Scholar
[23]
F. Li, Y. Yang, and J. Wu, in: Proceedings of the 29th IEEE Conference on Computer Communications, San Diego, CA, USA, pp.1-9, March 2010.
Google Scholar
[24]
Y. Li, P. Hui, D. Jin, L. Su, and L. Zeng, in: Proceedings of IEEE SECON, Salt Lake City, USA, pp.314-322, June 2011.
Google Scholar
[25]
J. Tang, C. Mascolo, M. Musolesi, and V. Latora, in: Proceedings of IEEE WoWMoM, Lucca, Italy, June 2011.
Google Scholar
[26]
J. Tang, H. Kim, C. Mascolo, and M. Musolesi, in: Proceedings of IEEE WoWMoM, San Francisco, USA, June 2012.
Google Scholar
[27]
C. Gao and J. Liu, accepted by IEEE Transactions on Mobile Computing, Digital Object Identifier: 10.1109/TMC.2012.29, 2012.
Google Scholar
[28]
C. Gao, J. Liu, and N. Zhong, IEEE Transactions on Parallel and Distributed Systems, Vol. 22, No. 7, pp.1222-1229, 2011.
Google Scholar