A Novel Structural-Entropy-based Classification Technique for Supporting Android Ransomware Detection and Analysis
暂无分享,去创建一个
Alfredo Cuzzocrea | Fabio Martinelli | Francesco Mercaldo | F. Martinelli | A. Cuzzocrea | F. Mercaldo
[1] Gerardo Canfora,et al. An HMM and structural entropy based detector for Android malware: An empirical study , 2016, Comput. Secur..
[2] Antonella Santone,et al. GreASE: A Tool for Efficient “Nonequivalence” Checking , 2014, TSEM.
[3] Bander Ali Saleh Al-rimy,et al. Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions , 2018, Comput. Secur..
[4] J. Kingsbury. The Illustrated Wavelet Transform Handbook: Introductory Theory and Applications in Science, Engineering, Medicine and Finance , 2004 .
[5] Antonella Santone,et al. Heuristic search for equivalence checking , 2014, Software & Systems Modeling.
[6] Robert Lyda,et al. Using Entropy Analysis to Find Encrypted and Packed Malware , 2007, IEEE Security & Privacy.
[7] Hisao Ishibuchi,et al. Fuzzy rule selection by multi-objective genetic local search algorithms and rule evaluation measures in data mining , 2004, Fuzzy Sets Syst..
[8] Philip S. Yu,et al. Top 10 algorithms in data mining , 2007, Knowledge and Information Systems.
[9] Fabio Martinelli,et al. R-PackDroid: API package-based characterization and detection of mobile ransomware , 2017, SAC.
[10] Monica Borda,et al. Fundamentals in Information Theory and Coding , 2011 .
[11] Antonella Santone,et al. Ransomware Steals Your Phone. Formal Methods Rescue It , 2016, FORTE.
[12] Mario Cannataro,et al. A Probabilistic Approach to Model Adaptive Hypermedia Systems , 2001, WebDyn@ICDT.
[13] Mark Stamp,et al. Structural entropy and metamorphic malware , 2013, Journal of Computer Virology and Hacking Techniques.
[14] Arun Kumar Sangaiah,et al. Android malware detection based on system call sequences and LSTM , 2019, Multimedia Tools and Applications.
[15] Antonella Santone,et al. Ransomware Inside Out , 2016, 2016 11th International Conference on Availability, Reliability and Security (ARES).
[16] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[17] Fabio Martinelli,et al. Evaluating Convolutional Neural Network for Effective Mobile Malware Detection , 2017, KES.
[18] Maria Luisa Villani,et al. Model Checking Multithreaded Programs by Means of Reduced Models , 2004, LDTA@ETAPS.
[19] Paul S. Addison,et al. The Illustrated Wavelet Transform Handbook Introductory Theory And Applications In Science , 2002 .
[20] Eyke Hüllermeier,et al. FURIA: an algorithm for unordered fuzzy rule induction , 2009, Data Mining and Knowledge Discovery.
[21] Stefano Zanero,et al. HelDroid: Dissecting and Detecting Mobile Ransomware , 2015, RAID.
[22] Ali A. Ghorbani,et al. DNA-Droid: A Real-Time Android Ransomware Detection Framework , 2017, NSS.
[23] Yu Yang,et al. Automated Detection and Analysis for Android Ransomware , 2015, 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems.
[24] Chris Cornelis,et al. Fuzzy-rough nearest neighbour classification and prediction , 2011, Theor. Comput. Sci..
[25] Giancarlo Fortino,et al. Managing Data and Processes in Cloud-Enabled Large-Scale Sensor Networks: State-of-the-Art and Future Research Directions , 2013, 2013 13th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing.
[26] Ivan Sorokin,et al. Comparing files using structural entropy , 2011, Journal in Computer Virology.
[27] Igor Santos,et al. Countering entropy measure attacks on packed software detection , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[28] Aniello Cimitile,et al. Talos: no more ransomware victims with formal methods , 2018, International Journal of Information Security.
[29] Pericles A. Mitkas,et al. Applying Machine Learning Techniques on Air Quality Data for Real-Time Decision Support , 2003 .
[30] Sanggeun Song,et al. The Effective Ransomware Prevention Technique Using Process Monitoring on Android Platform , 2016, Mob. Inf. Syst..
[31] Chris Cornelis,et al. A New Approach to Fuzzy-Rough Nearest Neighbour Classification , 2008, RSCTC.
[32] Miroslaw Malek,et al. Extinguishing Ransomware - A Hybrid Approach to Android Ransomware Detection , 2017, FPS.