Experimental Study with Real-world Data for Android App Security Analysis using Machine Learning
暂无分享,去创建一个
Nic Herndon | Doina Caragea | Sankardas Roy | Xinming Ou | Hongmin Li | Venkatesh Prasad Ranganath | Jordan DeLoach | Yuping Li | Nicolais Guevara | Sankardas Roy | Xinming Ou | Doina Caragea | Hongmin Li | Nic Herndon | J. DeLoach | Nicolais Guevara | Yuping Li
[1] Jason Nieh,et al. A measurement study of google play , 2014, SIGMETRICS '14.
[2] Blaine Nelson,et al. Can machine learning be secure? , 2006, ASIACCS '06.
[3] Konrad Rieck,et al. Machine learning for application layer intrusion detection , 2011 .
[4] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[5] Mu Zhang,et al. Semantics-Aware Android Malware Classification Using Weighted Contextual API Dependency Graphs , 2014, CCS.
[6] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[7] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[8] Pavel Laskov,et al. Practical Evasion of a Learning-Based Classifier: A Case Study , 2014, 2014 IEEE Symposium on Security and Privacy.
[9] Stefan Axelsson,et al. The base-rate fallacy and the difficulty of intrusion detection , 2000, TSEC.
[10] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[11] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[12] Vern Paxson,et al. Outside the Closed World: On Using Machine Learning for Network Intrusion Detection , 2010, 2010 IEEE Symposium on Security and Privacy.
[13] Patrick Traynor,et al. MAST: triage for market-scale mobile malware analysis , 2013, WiSec '13.
[14] Alessandra Gorla,et al. Mining Apps for Abnormal Usage of Sensitive Data , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.
[15] Mark Goadrich,et al. The relationship between Precision-Recall and ROC curves , 2006, ICML.
[16] AxelssonStefan. The base-rate fallacy and the difficulty of intrusion detection , 2000 .
[17] Tao Xie,et al. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context , 2015, 2015 IEEE/ACM 37th IEEE International Conference on Software Engineering.