@article{(Open Science Index):https://publications.waset.org/pdf/10007051,
	  title     = {Suggestion for Malware Detection Agent Considering Network Environment},
	  author    = {Ji-Hoon Hong and  Dong-Hee Kim and  Nam-Uk Kim and  Tai-Myoung Chung},
	  country	= {},
	  institution	= {},
	  abstract     = {Smartphone users are increasing rapidly. Accordingly, many companies are running BYOD (Bring Your Own Device: Policies to bring private-smartphones to the company) policy to increase work efficiency. However, smartphones are always under the threat of malware, thus the company network that is connected smartphone is exposed to serious risks. Most smartphone malware detection techniques are to perform an independent detection (perform the detection of a single target application). In this paper, we analyzed a variety of intrusion detection techniques. Based on the results of analysis propose an agent using the network IDS.
},
	    journal   = {International Journal of Computer and Systems Engineering},
	  volume    = {9},
	  number    = {11},
	  year      = {2015},
	  pages     = {2412 - 2415},
	  ee        = {https://publications.waset.org/pdf/10007051},
	  url   	= {https://publications.waset.org/vol/107},
	  bibsource = {https://publications.waset.org/},
	  issn  	= {eISSN: 1307-6892},
	  publisher = {World Academy of Science, Engineering and Technology},
	  index 	= {Open Science Index 107, 2015},
	}