MBotCS: A Mobile Botnet Detection System Based on Machine Learning
暂无分享,去创建一个
[1] Robert F. Murphy,et al. A neural network classifier capable of recognizing the patterns of all major subcellular structures in fluorescence microscope images of HeLa cells , 2001, Bioinform..
[2] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[3] Yajin Zhou,et al. Fast, scalable detection of "Piggybacked" mobile applications , 2013, CODASPY.
[4] Neeraj Bhargava,et al. Decision Tree Analysis on J48 Algorithm for Data Mining , 2013 .
[5] Hein S. Venter,et al. Mobile Botnet Detection Using Network Forensics , 2010, FIS.
[6] Sahin Albayrak,et al. Static Analysis of Executables for Collaborative Malware Detection on Android , 2009, 2009 IEEE International Conference on Communications.
[7] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .
[8] Sarah Jane Delany. k-Nearest Neighbour Classifiers , 2007 .
[9] Elisa Bertino,et al. Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..
[10] Yuval Elovici,et al. Detection, Alert and Response to Malicious Behavior in Mobile Devices: Knowledge-Based Approach , 2009, RAID.
[11] Hein S. Venter,et al. Combating Mobile Spam through Botnet Detection using Artificial Immune Systems , 2012, J. Univers. Comput. Sci..
[12] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[13] Christian Bauckhage,et al. A Probabilistic Diffusion Scheme for Anomaly Detection on Smartphones , 2010, WISTP.
[14] Ali Feizollah,et al. A Study Of Machine Learning Classifiers for Anomaly-Based Mobile Botnet Detection , 2013 .
[15] Sahin Albayrak,et al. Using static analysis for automatic assessment and mitigation of unwanted and malicious activities within Android applications , 2011, 2011 6th International Conference on Malicious and Unwanted Software.
[16] Laura A Chappell,et al. Wireshark 101: Essential Skills for Network Analysis , 2013 .
[17] M. Eslahi,et al. MoBots: A new generation of botnets on mobile devices and networks , 2012, 2012 International Symposium on Computer Applications and Industrial Electronics (ISCAIE).
[18] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[19] Georg Carle,et al. Packet sampling for worm and botnet detection in TCP connections , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[20] Vinod Yegneswaran,et al. An Analysis of the iKee.B iPhone Botnet , 2010, MobiSec.
[21] Yuval Shahar,et al. A Framework for Knowledge-Based Temporal Abstraction , 1997, Artif. Intell..
[22] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[23] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[24] Irina Rish,et al. An empirical study of the naive Bayes classifier , 2001 .
[25] Binxing Fang,et al. Andbot: Towards Advanced Mobile Botnets , 2011, USENIX Workshop on Large-Scale Exploits and Emergent Threats.
[26] Sahin Albayrak,et al. An Android Application Sandbox system for suspicious software detection , 2010, 2010 5th International Conference on Malicious and Unwanted Software.
[27] Гарнаева Мария Александровна,et al. Kaspersky security Bulletin 2013 , 2014 .