ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
3
views
0
references
Top references
cited by
3
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
1,221
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
SafeGuard: a behavior based real-time malware detection scheme for mobile multimedia applications in android platform
Author(s):
ES Jeong
,
IS Kim
,
DH Lee
,
Eun Jeong
,
In Kim
,
Dong Hoon Lee
Publication date:
2017
Journal:
Multimed Tools Appl
Read this article at
ScienceOpen
Publisher
Bookmark
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Electronic Workshops in Computing (eWiC)
Author and article information
Journal
DOI::
10.1007/s11042-016-4189-1
ScienceOpen disciplines:
Graphics & Multimedia design
Data availability:
ScienceOpen disciplines:
Graphics & Multimedia design
Comments
Comment on this article
Sign in to comment
scite_
Similar content
1,221
Correct interpretation of the WHO health workforce support and safeguards list 2023
Authors:
Giorgio Cometto
,
Mathieu Boniol
,
Agya Mahat
…
Artificial intelligence for global health: cautious optimism with safeguards
Authors:
Sameer Pujari
,
Andreas Reis
,
Yu Zhao
…
Human Rights and Social Wrongs: Issues in Safeguarding Adults with Learning Disabilities
Authors:
Deborah Kitson
,
Rachel Fyson
See all similar
Cited by
3
Cyber-Dependent Crimes: An Interdisciplinary Review
Authors:
David Maimon
,
Eric Louderback
Multimodal information fusion for android malware detection using lazy learning
Authors:
Zahid Qaisar
,
Ruixuan Li
The current state and future of mobile security in the light of the recent mobile security threat reports
Authors:
Ahmet Cevahir Cinar
,
Turkan Beyza Kara
See all cited by