Chen W D,Hancke G P,Mayes K E,et al.Using3Gnetwork components to enable NFC mobile transactions and authentication[C]//Progress in Informatics and Computing(PIC),2010IEEE International Conference on,IEEE,2010,1:441-448.
[2]
Aafer Y,Du W,Yin H.DroidAPIMiner:Mining API-level features for robust malware detection in android[C]//Security and Privacy in Communication Networks.Springer International Publishing,2013:86-103.
[3]
陈华平,唐军.移动支付的使用者与使用行为研究[J].管理科学,2006,19(6):48-55.Chen Huaping,Tang Jun.Research of mobile payment user and user behavior[J].China Business and Market,2006,19(6):48-55.
[4]
Zhang H,Berg A C,Maire M,et al.SVM-KNN:Discriminative nearest neighbor classification for visual category recognition[C]//Computer Vision and Pattern Recognition,2006IEEE Computer Society Conference on,IEEE,2006,2:2126-2136.
[5]
Padala P.Playing with ptrace,Part I[J].Linux Journal,2002,(103):5.
[6]
Peng H,Long F,Ding C.Feature selection based on mutual information criteria of max-dependency,maxrelevance,and min-redundancy[J].Pattern Analysis and Machine Intelligence,IEEE Transactions on,2005,27(8):1226-1238.
[7]
Mobile Payment Forum,Ltd.Mobile payment forum white paper[R].http://www.mobilepaymentforum.org
[8]
岳云康.我国电子商务环境下的移动支付问题研究[J].中国流通经济,2008,(1):40-43.Yue Yunkang.Research of mobile payment in the light of China’s E-commerce[J].China Business and Market,2008,(1):40-43.
[9]
Fun T S,Beng L Y,Likoh J,et al.A lightweight and private mobile payment protocol by using mobile network operator[C]//Computer and Communication Engineering,2008.ICCCE 2008.International Conference on.IEEE,2008:162-166.
[10]
Chen W,Hancke G P,Mayes K E,et al.NFC mobile transactions and authentication based on GSM network[C]//Near Field Communication(NFC),2010 Second International Workshop on,IEEE,2010:83-89.
[11]
Ye Y,Li T,Jiang Q,et al.CIMDS:Adapting postprocessing techniques of associative classification for malware detection[J].Systems,Man,and Cybernetics,Part C:Applications and Reviews,IEEE Transactions on,2010,40(3):298-307.
Jacoby G A,Davis IV N J.Battery-based intrusion detection[C]//Global Telecommunications Conference,2004.GLOBECOM’04.IEEE.IEEE,2004,4:2250-2255.
[14]
Shedid S M,Kouta M.Modified SET protocol for mobile payment:an empirical analysis[C]//Software Technology and Engineering(ICSTE),2010 2nd International Conference on,IEEE,2010,1:350-355.
[15]
Chiang H S,Tsaur W.Mobile malware behavioral analysis and preventive strategy using ontology[C]//Social Computing(SocialCom),2010IEEE Second International Conference on,IEEE,2010:1080-1085.
[16]
Shabtai A.Malware detection on mobile devices[C]//Mobile Data Management,2010:289-290.