Analysis of machine learning solutions to detect malware in android
暂无分享,去创建一个
[1] Satoshi Sekine,et al. A survey of named entity recognition and classification , 2007 .
[2] Arvinder Kaur,et al. Comparative analysis of regression and machine learning methods for predicting fault proneness models , 2009, Int. J. Comput. Appl. Technol..
[3] Wenjia Li,et al. Detecting Malware for Android Platform: An SVM-Based Approach , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[4] Zane A Markel. Machine Learning Based Malware Detection , 2015 .
[5] Mohd Faizal Abdollah,et al. Analysis of Features Selection and Machine Learning Classifier in Android Malware Detection , 2014, 2014 International Conference on Information Science & Applications (ICISA).
[6] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[7] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[8] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[9] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[10] Aiman Abu Samra,et al. Analysis of Clustering Technique in Android Malware Detection , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[11] Muhammad Zubair Shafiq,et al. Are evolutionary rule learning algorithms appropriate for malware detection? , 2009, GECCO '09.
[12] Michael Franz,et al. Fine-Grained Information Flow Analysis and Enforcement in a Java Virtual Machine , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[13] Igor Santos,et al. Semi-supervised Learning for Unknown Malware Detection , 2011, DCAI.
[14] Daphne Koller,et al. Support Vector Machine Active Learning with Applications to Text Classification , 2000, J. Mach. Learn. Res..
[15] Igor Santos,et al. On the automatic categorisation of android applications , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[16] Eric Bodden,et al. A Machine-learning Approach for Classifying and Categorizing Android Sources and Sinks , 2014, NDSS.
[17] Marius Kloft,et al. Toward Supervised Anomaly Detection , 2014, J. Artif. Intell. Res..
[18] Paul M. Thompson,et al. Genetic influences on human brain morphology , 2004, 2004 2nd IEEE International Symposium on Biomedical Imaging: Nano to Macro (IEEE Cat No. 04EX821).
[19] Carsten Willems,et al. Learning and Classification of Malware Behavior , 2008, DIMVA.
[20] Zhuoqing Morley Mao,et al. Automated Classification and Analysis of Internet Malware , 2007, RAID.
[21] Yuan Zhang,et al. Vetting undesirable behaviors in android apps with permission use analysis , 2013, CCS.
[22] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[23] Dawn Xiaodong Song,et al. Mining Permission Request Patterns from Android and Facebook Applications , 2012, 2012 IEEE 12th International Conference on Data Mining.
[24] Erol Gelenbe,et al. Mobile Network Anomaly Detection and Mitigation: The NEMESYS Approach , 2013, ISCIS.
[25] Nicholas Jalbert,et al. Automated duplicate detection for bug tracking systems , 2008, 2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN).
[26] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[27] Ke Tang,et al. Combining Semi-Supervised and active learning for hyperspectral image classification , 2013, 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM).
[28] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[29] Jiawei Han,et al. Classification of software behaviors for failure detection: a discriminative pattern mining approach , 2009, KDD.
[30] Yoseba K. Penya,et al. Automatic Behaviour-based Analysis and Classification System for Malware Detection , 2010, ICEIS.
[31] David Lo,et al. Information Retrieval Based Nearest Neighbor Classification for Fine-Grained Bug Severity Prediction , 2012, 2012 19th Working Conference on Reverse Engineering.
[32] Yuval Elovici,et al. Automated Static Code Analysis for Classifying Android Applications Using Machine Learning , 2010, 2010 International Conference on Computational Intelligence and Security.
[33] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[34] Md. Rafiqul Islam,et al. An automated classification system based on the strings of trojan and virus families , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[35] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[36] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[37] Hao Chen,et al. AndroidLeaks: Automatically Detecting Potential Privacy Leaks in Android Applications on a Large Scale , 2012, TRUST.
[38] Yu-Xin Meng,et al. The practice on using machine learning for network anomaly intrusion detection , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[39] David Lo,et al. Automatic Fine-Grained Issue Report Reclassification , 2014, 2014 19th International Conference on Engineering of Complex Computer Systems.
[40] Lynn Margaret Batten,et al. Function length as a tool for malware classification , 2008, 2008 3rd International Conference on Malicious and Unwanted Software (MALWARE).
[41] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.