Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (208)
- Physical Sciences and Mathematics (195)
- Computer Sciences (192)
- Business (151)
- Databases and Information Systems (89)
-
- Economics (77)
- International and Area Studies (69)
- Asian Studies (68)
- Numerical Analysis and Scientific Computing (43)
- Software Engineering (37)
- Engineering (36)
- Law (36)
- Econometrics (34)
- Organizational Behavior and Theory (31)
- Public Affairs, Public Policy and Public Administration (30)
- Information Security (26)
- Psychology (25)
- Sociology (23)
- Artificial Intelligence and Robotics (21)
- Arts and Humanities (18)
- Computer Engineering (18)
- Technology and Innovation (18)
- Finance and Financial Management (17)
- Operations Research, Systems Engineering and Industrial Engineering (17)
- Portfolio and Security Analysis (17)
- Communication (16)
- Finance (16)
- Graphics and Human Computer Interfaces (16)
- Education (14)
- Human Resources Management (14)
- Keyword
-
- Singapore (18)
- China (8)
- Singapore Management University (7)
- Culture (6)
- Model Check (5)
-
- Context (4)
- India (4)
- Label Transition System (4)
- Linear Temporal Logic (4)
- Trust (4)
- Uncertainty (4)
- Chinese New Year (3)
- Indonesia (3)
- Learning (3)
- Maximum likelihood (3)
- Mildly explosive process (3)
- Mobile computing (3)
- Monotonicity (3)
- Negotiation (3)
- Physical attractiveness (3)
- Query processing (3)
- Scalability (3)
- Social networks (3)
- Spatial database (3)
- Taiwan (3)
- ASEAN (2)
- Active learning (2)
- Affect (2)
- Algorithm (2)
- Algorithms (2)
- Publication
-
- Research Collection School Of Computing and Information Systems (192)
- Research Collection Lee Kong Chian School Of Business (77)
- Research Collection School Of Economics (63)
- Research Collection School of Social Sciences (49)
- Research Collection Yong Pung How School Of Law (31)
-
- Social Space (23)
- Dissertations and Theses Collection (Open Access) (20)
- Knowledge@SMU (19)
- Research Collection School Of Accountancy (6)
- SMU Press Releases (6)
- Research Collection Library (3)
- Research Collection School of Economics (2)
- CMP Research (1)
- Jochen Reb (1)
- Lien Centre for Social Innovation: Research (1)
- Report to Stakeholders (1)
- Research Collection BNP Paribas Hedge Fund Centre (1)
- Research Collection Institute of Service Excellence (1)
- Research Collection School of Accountancy (1)
- Publication Type
Articles 1 - 30 of 498
Full-Text Articles in Entire DC Network
Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong
Scalable Multi-Core Model Checking Fairness Enhanced Systems, Yang Liu, Jun Sun, Jin Song Dong
Research Collection School Of Computing and Information Systems
Rapid development in hardware industry has brought the prevalence of multi-core systems with shared-memory, which enabled the speedup of various tasks by using parallel algorithms. The Linear Temporal Logic (LTL) model checking problem is one of the difficult problems to be parallelized or scaled up to multi-core. In this work, we propose an on-the-fly parallel model checking algorithm based on the Tarjan’s strongly connected components (SCC) detection algorithm. The approach can be applied to general LTL model checking or with different fairness assumptions. Further, it is orthogonal to state space reduction techniques like partial order reduction. We enhance our PAT …
Asian Maths Whizz And Talkative Females: How Stereotypes Can Actually Boost Performance, Knowledge@Smu
Asian Maths Whizz And Talkative Females: How Stereotypes Can Actually Boost Performance, Knowledge@Smu
Knowledge@SMU
Nobody likes to be pigeonholed or reduced to a single stereotype. One reason could be because we believe ourselves to be products of multiple stereotypes: a combination of identities, such as "Asian", "female", "lawyer", "Gen X", "Christian", "Chinese", etc. While these labels connect us to like-individuals, they can also carry all sorts of connotations and expectations – positive, neutral and negative. For example, an Asian might be expected to outperform a non-Asian at mathematics because of stereotypes that Asians are mathematically inclined. Will such undue expectations affect the Asian's performance outcome? Research studies point to a 'Yes'.
When Foreigners Influence Domestic Change: A Case For Transnational Advocacy, Knowledge@Smu
When Foreigners Influence Domestic Change: A Case For Transnational Advocacy, Knowledge@Smu
Knowledge@SMU
Like it or not, socio-environmental issues extend beyond geopolitical boundaries. Southeast Asians might remember the Indonesian haze that had affected the region's air quality, for instance – an issue that was eventually addressed with the help of foreign groups; or the recovery efforts of the 2004 tsunami, which also involved many international entities. According to Yooil Bae, a political science professor at SMU, foreign groups can bring new insights and methods. But while there are benefits to knowledge-sharing and cooperation, the process can be tricky, especially when such advocacy groups clash with the state.
To Groom And Retain Talents, Asian Organisations Look To The West, Knowledge@Smu
To Groom And Retain Talents, Asian Organisations Look To The West, Knowledge@Smu
Knowledge@SMU
Is there a scarcity of talents in Asia? While opportunities are abound for businesses in the region, many organisations struggle to find the "right" people to seize those opportunities. Those that do a good job of grooming and retaining their future leaders will find themselves to be in an advantageous position. But why should organisations invest in nurturing their flock when seats to the corner offices are already "reserved" for an in-group of family members, friends, scholars, social elites, etc? This is especially problematic in Asia, where many large organisations are either family-owned or state-owned.
How Valued-Added Is Your Library Instruction? Research Librarians Work With Faculty To Conduct In-Class Training, Charlotte Gill, Rajendra Munoo, Priyanka Sharma
How Valued-Added Is Your Library Instruction? Research Librarians Work With Faculty To Conduct In-Class Training, Charlotte Gill, Rajendra Munoo, Priyanka Sharma
Research Collection Library
This training ws developed as a helpful follow-up for the future business decision-makers to be introduced to the process of thinking through the legal implications of business services and products, with a view to giving cogent instructions to legal counsel.
Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin
Duol: A Double Updating Approach For Online Learning, Peilin Zhao, Steven C. H. Hoi, Rong Jin
Research Collection School Of Computing and Information Systems
In most online learning algorithms, the weights assigned to the misclassified examples (or support vectors) remain unchanged during the entire learning process. This is clearly insufficient since when a new misclassified example is added to the pool of support vectors, we generally expect it to affect the weights for the existing support vectors. In this paper, we propose a new online learning method, termed Double Updating Online Learning, or DUOL for short. Instead of only assigning a fixed weight to the misclassified example received in current trial, the proposed online learning algorithm also tries to update the weight for one …
Managing Supply Uncertainty With An Information Market, Zhiling Guo, Fang Fang, Andrew B. Whinston
Managing Supply Uncertainty With An Information Market, Zhiling Guo, Fang Fang, Andrew B. Whinston
Research Collection School Of Computing and Information Systems
We propose a market-based information aggregation mechanism to manage the supply side uncertainty in the supply chain. In our analytical model, a simple supply chain consists of a group of retailers who order a homogeneous product from two suppliers. The two suppliers differ in their ability to fulfill orders – one always delivers orders and the other fulfills orders probabilistically. We model the supply chain decisions as a Stackelberg game where the supplier who has uncertain reliability decides a wholesale price before the retailers who independently receive signals about the supplier’s reliability determine their sourcing strategies. We then propose an …
The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim
The Role Of Is Project Critical Success Factors: A Revelatory Case, Cecil Eng Huang Chua, Wee Kiat Lim
CMP Research
Research in Critical Success Factors (CSFs) of Enterprise Systems (ES) projects has identified numerous practitioner governance mechanisms for ensuring project success. However, such research has not developed a theory of why certain critical success factors encourage project success. Our research develops such theory on a case study where even though the levels of several critical success factors were weak, the project nevertheless succeeded. Specifically, the logistics ES project succeeded even though there was (1) only marginal top management support, (2) low key user commitment, and (3) change management, training and other critical aspects of user management and communication were not …
To Trust Or Not To Trust? Predicting Online Trusts Using Trust Antecedent Framework, Viet-An Nguyen, Ee Peng Lim, Jing Jiang, Aixin Sun
To Trust Or Not To Trust? Predicting Online Trusts Using Trust Antecedent Framework, Viet-An Nguyen, Ee Peng Lim, Jing Jiang, Aixin Sun
Research Collection School Of Computing and Information Systems
This paper analyzes the trustor and trustee factors that lead to inter-personal trust using a well studied Trust Antecedent framework in management science. To apply these factors to trust ranking problem in online rating systems, we derive features that correspond to each factor and develop different trust ranking models. The advantage of this approach is that features relevant to trust can be systematically derived so as to achieve good prediction accuracy. Through a series of experiments on real data from Epinions, we show that even a simple model using the derived features yields good accuracy and outperforms MoleTrust, a trust …
Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim
Cyber Attacks: Does Physical Boundary Matter?, Qiu-Hong Wang, Seung-Hyun Kim
Research Collection School Of Computing and Information Systems
Information security issues are characterized with interdependence. Particularly, cyber criminals can easily cross national boundaries and exploit jurisdictional limitations between countries. Thus, whether cyber attacks are spatially autocorrelated is a strategic issue for government authorities and a tactic issue for insurance companies. Through an empirical study of cyber attacks across 62 countries during the period 2003-2007, we find little evidence on the spatial autocorrelation of cyber attacks at any week. However, after considering economic opportunity, IT infrastructure, international collaboration in enforcement and conventional crimes, we find strong evidence that cyber attacks were indeed spatially autocorrelated as they moved over time. …
Wake Up Or Fall Asleep: Value Implication Of Trusted Computing, Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma
Wake Up Or Fall Asleep: Value Implication Of Trusted Computing, Nan Hu, Jianhui Huang, Ling Liu, Yingjiu Li, Dan Ma
Research Collection School Of Computing and Information Systems
More than 10 years have passed since trusted computing (TC) technology was introduced to the market; however, there is still no consensus about its value. The increasing importance of user and enterprise security and the security promised by TC, coupled with the increasing tension between the proponents and the opponents of TC, make it timely to investigate the value relevance of TC in terms of both capital market and accounting performance. Based on both price and volume studies, we found that news releases related to the adoption of the TC technology had no information content. All investors, regardless of whether …
Computationally Secure Hierarchical Self-Healing Key Distribution For Heterogeneous Wireless Sensor Networks, Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao
Computationally Secure Hierarchical Self-Healing Key Distribution For Heterogeneous Wireless Sensor Networks, Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao
Research Collection School Of Computing and Information Systems
Self-healing group key distribution is a primitive aimed to achieve robust key distribution in wireless sensor networks (WSNs) over lossy communication channels. However, all the existing self-healing group key distribution schemes in the literature are designed for homogenous WSNs that do not scale. In contract, heterogeneous WSNs have better scalability and performance. We are thus motivated to study self-healing group key distribution for heterogeneous WSNs. In particular, we propose the concept of hierarchical self-healing group key distribution, tailored to the heterogeneous WSN architecture; we further revisit and adapt Dutta et al.’s model to the setting of hierarchical self-healing group …
Opportunity Cost Neglect, Shane Frederick, Nathan Novemsky, Jing (Jane) Wang, Ravi Dhar, Stephen Nowlis
Opportunity Cost Neglect, Shane Frederick, Nathan Novemsky, Jing (Jane) Wang, Ravi Dhar, Stephen Nowlis
Research Collection Lee Kong Chian School Of Business
To properly consider the opportunity costs of a purchase, consumers must actively generate the alternatives that it would displace. The current research suggests that consumers often fail to do so. Even under conditions promoting cognitive effort, various cues to consider opportunity costs reduce purchase rates and increase the choice share of more affordable options. Sensitivity to such cues varies with chronic dispositional differences in spending attitudes. We discuss the implications of these results for the marketing strategies of economy and premium brands.
On The Accuracy And Stability Of A Variety Of Differential Quadrature Formulations For The Vibration Analysis Of Beams, C. H. W. Ng, Yibao Zhao, Y. Xiang, G. W. Wei
On The Accuracy And Stability Of A Variety Of Differential Quadrature Formulations For The Vibration Analysis Of Beams, C. H. W. Ng, Yibao Zhao, Y. Xiang, G. W. Wei
Research Collection Lee Kong Chian School Of Business
The occurrence of spurious complex eigenvalues is a serious stability problem in many differential quadrature methods (DQMs). This paper studies the accuracy and stability of a variety of different differential quadrature formulations. Special emphasis is given to two local DQMs. One utilizes both fictitious grids and banded matrices, called local adaptive differential quadrature method (LaDQM). The other has banded matrices without using fictitious grids to facilitate boundary conditions, called finite difference differential quadrature methods (FDDQMs). These local DQMs include the classic DQMs as special cases given by extending their banded matrices to full matrices. LaDQMs and FDDQMs are implemented on …
Empirical Likelihood In Missing Data Problems, Jing Qin, Biao Zhang, Denis H. Y. Leung
Empirical Likelihood In Missing Data Problems, Jing Qin, Biao Zhang, Denis H. Y. Leung
Research Collection School Of Economics
Missing data is a ubiquitous problem in medical and social sciences. It is well known that inferences based only on the complete data may not only lose efficiency, but may also lead to biased results if the data is not missing completely at random (MCAR). The inverse-probability weighting method proposed by Horvitz and Thompson (1952) is a popular alternative when the data is not MCAR. The Horvitz–Thompson method, however, is sensitive to the inverse weights and may suffer from loss of efficiency. In this paper, we propose a unified empirical likelihood approach to missing data problems and explore the use …
Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
Denial-Of-Service Attacks On Host-Based Generic Unpackers, Limin Liu, Jiang Ming, Zhi Wang, Debin Gao, Chunfu Jia
Research Collection School Of Computing and Information Systems
With the advance of packing techniques, a few generic and automatic unpackers have been proposed. These unpackers are designed to automatically unpack packed binaries without specific knowledge of the packing techniques used. In this paper, we present an automatic packer with which packed malware forges spurious unpacking behaviors that lead to a denial-of-service attack on host-based generic unpackers. We present the design, implementation, and evaluation of the proposed packer and malware produced using the proposed packer, and show the success of denial-of-service attacks on host-based generic unpackers.
A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li
A Robust Damage Assessment Model For Corrupted Database Systems, Ge Fu, Hong Zhu, Yingjiu Li
Research Collection School Of Computing and Information Systems
An intrusion tolerant database uses damage assessment techniques to detect damage propagation scales in a corrupted database system. Traditional damage assessment approaches in a intrusion tolerant database system can only locate damages which are caused by reading corrupted data. In fact, there are many other damage spreading patterns that have not been considered in traditional damage assessment model. In this paper, we systematically analyze inter-transaction dependency relationships that have been neglected in the previous research and propose four different dependency relationships between transactions which may cause damage propagation. We extend existing damage assessment model based on the four novel dependency …
A New Approach For Anonymous Password Authentication, Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
A New Approach For Anonymous Password Authentication, Yanjiang Yang, Jianying Zhou, Jian Weng, Feng Bao
Research Collection School Of Computing and Information Systems
Anonymous password authentication reinforces password authentication with the protection of user privacy. Considering the increasing concern of individual privacy nowadays, anonymous password authentication represents a promising privacy-preserving authentication primitive. However, anonymous password authentication in the standard setting has several inherent weaknesses, making its practicality questionable. In this paper, we propose a new and efficient approach for anonymous password authentication. Our approach assumes a different setting where users do not register their passwords to the server; rather, they use passwords to protect their authentication credentials. We present a concrete scheme, and get over a number of challenges in securing password-protected credentials …
Learning Bregman Distance Functions And Its Application For Semi-Supervised Clustering, Lei Wu, Rong Jin, Steven C. H. Hoi, Jianke Zhu, Nenghai Yu
Learning Bregman Distance Functions And Its Application For Semi-Supervised Clustering, Lei Wu, Rong Jin, Steven C. H. Hoi, Jianke Zhu, Nenghai Yu
Research Collection School Of Computing and Information Systems
Learning distance functions with side information plays a key role in many machine learning and data mining applications. Conventional approaches often assume a Mahalanobis distance function. These approaches are limited in two aspects: (i) they are computationally expensive (even infeasible) for high dimensional data because the size of the metric is in the square of dimensionality; (ii) they assume a fixed metric for the entire input space and therefore are unable to handle heterogeneous data. In this paper, we propose a novel scheme that learns nonlinear Bregman distance functions from side information using a nonparametric approach that is similar to …
The Hard Embodiment Of Culture, Dov Cohen, Angela K. Y. Leung
The Hard Embodiment Of Culture, Dov Cohen, Angela K. Y. Leung
Research Collection School of Social Sciences
The way humans move and comport their bodies is one way they (literally) carry their culture. In pre-wired embodiments, body comportment triggers basic, evolutionarily prepared affective and cognitive reactions that subsequently prime more complex representations. Culture suffuses this process, because (1) cultural artifacts, affordances, and practices make certain body comportments more likely, (2) cultural practices, rituals, schemas, and rules promote the learning of an otherwise underspecified connection between a given body comportment and a particular basic reaction, and (3) cultural meaning systems elaborate basic affective and cognitive reactions into more complex representations. These points are illustrated with three experiments that …
Culture, Psyche, And Body Make Each Other Up, Dov Cohen, Angela K. Y. Leung, Hans Ijzerman
Culture, Psyche, And Body Make Each Other Up, Dov Cohen, Angela K. Y. Leung, Hans Ijzerman
Research Collection School of Social Sciences
The commentaries make important points, including ones about the purposeful uses of embodiment effects. Research examining such effects needs to look at how such effects play themselves out in people's everyday lives. Research might usefully integrate work on embodiment with work on attribution and work in other disciplines concerned with body–psyche connections (e.g., research on somaticizing versus “psychologizing” illnesses and hypercognizing versus hypocognizing emotions). Such work may help us understand the way positive and negative feedback loops operate as culture, psyche, and body make each other up.
The Palimpsest Of Exile [Book Review], Kirpal Singh
The Palimpsest Of Exile [Book Review], Kirpal Singh
Research Collection School of Social Sciences
Book review of Dipika Mukherjee, The Palimpsest of Exile. Alberta: Rubicon Press, 2009. 34 pp. ISBN 978-0-9809278-9-4.
Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan
Adaptive Type-2 Fuzzy Maintenance Advisor For Offshore Power Systems, Zhaoxia Wang, C. S. Chang, Fan Yang, W. W. Tan
Research Collection School Of Computing and Information Systems
Proper maintenance strategies are very desirable for minimizing the operational and maintenance costs of power systems without sacrificing reliability. Condition-based maintenance has largely replaced time-based maintenance because of the former's potential economic benefits. As offshore substations are often remotely located, they experience more adverse environments, higher failures, and therefore need more powerful analytical tools than their onshore counterpart. As reliability information collected during operation of an offshore substation can rarely avoid uncertainties, it is essential to obtain consistent estimates of reliability measures under changing environmental and operating conditions. Some attempts with type-1 fuzzy logic were made with limited success in …
An Organizational Impression Management Perspective On The Formation Of Corporate Reputations, Scott Highhouse, Margaret E. Brooks, Gary J. Gregarus
An Organizational Impression Management Perspective On The Formation Of Corporate Reputations, Scott Highhouse, Margaret E. Brooks, Gary J. Gregarus
Research Collection Lee Kong Chian School Of Business
Researchers have only recently turned their attention to the study of corporate reputation.As is characteristic of many early areas of management inquiry, the field is decidedly multidisciplinary and disconnected. This article selectively reviews reputation research conducted mainly during the past decade. A framework is proposed that views reputation from the perspective of organizational impression management. Corporations are viewed as social actors, intent on enhancing their respectability and impressiveness in the eyes of constituents.
Dialogic Cosmopolitanism And Global Justice, Eduard Christiaan Jordaan
Dialogic Cosmopolitanism And Global Justice, Eduard Christiaan Jordaan
Research Collection School of Social Sciences
Although the term “cosmopolitan-communitarian debate” never really caught on, a national-global fault line remains prominent in debates about global justice. “Dialogic cosmopolitanism” holds the promise of bridging this alleged fault line by accepting many of the communitarian criticisms against cosmopolitanism and following what can be described as a communitarian path to cosmopolitanism. This article identifies and describes four key elements that distinguish dialogic cosmopolitanism: a respect for difference; a commitment to genuine dialogue; an open, hesitant and self-problematising attitude on the part of the moral subject; and an undertaking to expand the boundaries of moral concern to the point of …
Spirituality At Work In A Changing World: Managerial And Research Implications, Eugene Geh, Gilbert Tan
Spirituality At Work In A Changing World: Managerial And Research Implications, Eugene Geh, Gilbert Tan
Research Collection Lee Kong Chian School Of Business
This paper identifies the seminal works of key theorists in the field of spirituality and traces the development of the key ideas of spirituality at the workplace in relation to their relevance in today's organizational context. We examine how having a healthy orientation towards spirituality at work can lead to desirable individual and organizational outcomes. Particular emphasis is placed on understanding the rapidly changing workplace and its future directions by first uncovering the rationale behind the evolution of management thought since the introduction of Taylor's scientific management and then, by examining the various stages of economic development and as well …
Who Governs Energy? The Challenges Facing Global Energy Governance, Ann Florini, Benjamin K. Sovacool
Who Governs Energy? The Challenges Facing Global Energy Governance, Ann Florini, Benjamin K. Sovacool
Research Collection School of Social Sciences
This article conceptualizes the energy problems facing society from a global governance perspective. It argues that a notion of "global energy governance," taken to mean international collective action efforts undertaken to manage and distribute energy resources and provide energy services, offers a meaningful and useful framework for assessing energy-related challenges. The article begins by exploring the concepts of governance, global governance, and global energy governance. It then examines some of the existing institutions in place to establish and carry out rules and norms governing global energy problems and describes the range of institutional design options available to policymakers. It briefly …
Dialogic Cosmopolitanism And Global Justice, Eduard Jordaan
Dialogic Cosmopolitanism And Global Justice, Eduard Jordaan
Research Collection School of Social Sciences
Although the term “cosmopolitan-communitarian debate” never really caught on, a national-global fault line remains prominent in debates about global justice. “Dialogic cosmopolitanism” holds the promise of bridging this alleged fault line by accepting many of the communitarian criticisms against cosmopolitanism and following what can be described as a communitarian path to cosmopolitanism. This article identifies and describes four key elements that distinguish dialogic cosmopolitanism: a respect for difference; a commitment to genuine dialogue; an open, hesitant and self-problematising attitude on the part of the moral subject; and an undertaking to expand the boundaries of moral concern to the point of …
On The Untraceability Of Anonymous Rfid Authentication Protocol With Constant Key-Lookup, Bing Liang, Yingjiu Li, Tieyan Li, Robert H. Deng
On The Untraceability Of Anonymous Rfid Authentication Protocol With Constant Key-Lookup, Bing Liang, Yingjiu Li, Tieyan Li, Robert H. Deng
Research Collection School Of Computing and Information Systems
In ASIACCS'08, Burmester, Medeiros and Motta proposed an anonymous RFID authentication protocol (BMM protocol [2]) that preserves the security and privacy properties, and achieves better scalability compared with other contemporary approaches. We analyze BMM protocol and find that some of security properties (especial untraceability) are not fulfilled as originally claimed. We consider a subtle attack, in which an adversary can manipulate the messages transmitted between a tag and a reader for several continuous protocol runs, and can successfully trace the tag after these interactions. Our attack works under a weak adversary model, in which an adversary can eavesdrop, intercept and …
Insights Into Malware Detection And Prevention On Mobile Phones, Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng
Insights Into Malware Detection And Prevention On Mobile Phones, Qiang Yan, Yingjiu Li, Tieyan Li, Robert H. Deng
Research Collection School Of Computing and Information Systems
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding the negative impact of the functionality limitations of mobile phones to keep the performance cost within the limitations of mobile phones. Being different, this paper investigates the positive impact of these limitations on suppressing the development of mobile malware. We study the state-of-the-art mobile malware, as well as the progress …