Detecting energy-greedy anomalies and mobile malware variants,” (2008)

by H Kim, J Smith, K Shin
Venue:in International Conference on Mobile Systems, Applications, and Services,