Neural Visualization of Android Malware Families
暂无分享,去创建一个
Álvaro Herrero | Emilio Corchado | Alejandro González | E. Corchado | Á. Herrero | Alejandro González | Álvaro Herrero
[1] Simin Nadjm-Tehrani,et al. Detection and Visualization of Android Malware Behavior , 2016, J. Electr. Comput. Eng..
[2] Daniel A. Keim,et al. A Survey of Visualization Systems for Malware Analysis , 2015, EuroVis.
[3] Luo Si,et al. A Probabilistic Discriminative Model for Android Malware Detection with Decompiled Source Code , 2015, IEEE Transactions on Dependable and Secure Computing.
[4] Stefan Kraxberger,et al. Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) , 2016, Secur. Commun. Networks.
[5] Srinivas Mukkamala,et al. Mobile malware visual analytics and similarities of Attack Toolkits (Malware gene analysis) , 2013, 2013 International Conference on Collaboration Technologies and Systems (CTS).
[6] Aziz Mohaisen,et al. Detecting and classifying method based on similarity matching of Android malware behavior with profile , 2016, SpringerPlus.
[7] Marc M. Van Hulle,et al. Enhancing the Yield of High-Density electrode Arrays through Automated electrode Selection , 2012, Int. J. Neural Syst..
[8] Gonzalo Álvarez,et al. MAMA: MANIFEST ANALYSIS FOR MALWARE DETECTION IN ANDROID , 2013, Cybern. Syst..
[9] Veelasha Moonsamy,et al. Mining permission patterns for contrasting clean and malicious android applications , 2014, Future Gener. Comput. Syst..
[10] Álvaro Herrero,et al. A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..
[11] Emilio Corchado,et al. Maximum and Minimum Likelihood Hebbian Learning for Exploratory Projection Pursuit , 2002, ICANN.
[12] L. Chou,et al. An empirical analysis of land property lawsuits and rainfalls , 2016, SpringerPlus.
[13] Pengcheng Ma,et al. ψ-Contraction and $$(\phi ,\varphi )$$(ϕ,φ)-contraction in Menger probabilistic metric space , 2016, SpringerPlus.
[14] Saba Arshad,et al. Android Malware Detection & Protection: A Survey , 2016 .
[15] Álvaro Herrero,et al. Neural Analysis of HTTP Traffic for Web Attack Detection , 2015, CISIS-ICEUTE.
[16] Won Ryu,et al. Analyzing and detecting method of Android malware via disassembling and visualization , 2014, 2014 International Conference on Information and Communication Technology Convergence (ICTC).
[17] Álvaro Herrero,et al. Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..
[18] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[19] Emilio Corchado,et al. Connectionist Techniques For The Identification And Suppression Of Interfering Underlying Factors , 2003, Int. J. Pattern Recognit. Artif. Intell..
[20] Colin Fyfe,et al. A Neural Network for PCA and Beyond , 1997, Neural Processing Letters.
[21] Karl Pearson F.R.S.. LIII. On lines and planes of closest fit to systems of points in space , 1901 .
[22] Erkki Oja,et al. Principal components, minor components, and linear neural networks , 1992, Neural Networks.
[23] Javier Bajo,et al. idMAS-SQL: Intrusion Detection Based on MAS to Detect and Block SQL injection through data mining , 2013, Inf. Sci..