APK Auditor: Permission-based Android malware detection system
暂无分享,去创建一个
[1] M. Brooks,et al. THE MECHANISM OF METHYLENE BLUE ACTION ON BLOOD. , 1934 .
[2] Pekka Nikander,et al. Towards Network Denial of Service Resistant Protocols , 2000, SEC.
[3] Heejo Lee,et al. On the effectiveness of probabilistic packet marking for IP traceback under denial of service attack , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[4] Anind K. Dey,et al. Location-Based Services for Mobile Telephony: a Study of Users' Privacy Concerns , 2003, INTERACT.
[5] Tara Matthews,et al. Location disclosure to social relations: why, when, & what people want to share , 2005, CHI.
[6] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[7] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[8] Amadeo José Argüelles-Cruz,et al. Alpha-Beta Weightless Neural Networks , 2008, CIARP.
[9] Beatrice Gralton,et al. Washington DC - USA , 2008 .
[10] Lorrie Faith Cranor,et al. Understanding and capturing people’s privacy policies in a mobile social networking application , 2009, Personal and Ubiquitous Computing.
[11] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[12] Yihao Zhang,et al. An Application of Element Oriented Analysis Based Credit Scoring , 2010, ICDM.
[13] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[14] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[15] John Zimmerman,et al. I'm the mayor of my house: examining why people use foursquare - a social-driven location sharing application , 2011, CHI.
[16] Nicolas Christin,et al. All Your Droid Are Belong to Us: A Survey of Current Android Attacks , 2011, WOOT.
[17] Lorrie Faith Cranor,et al. When are users comfortable sharing locations with advertisers? , 2011, CHI.
[18] Swarat Chaudhuri,et al. A Study of Android Application Security , 2011, USENIX Security Symposium.
[19] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[20] David A. Wagner,et al. The Effectiveness of Application Permissions , 2011, WebApps.
[21] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[22] Jennifer King,et al. Privacy: is there an app for that? , 2011, SOUPS.
[23] Hans Byström. Movie Recommendations from User Ratings , 2011 .
[24] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[25] David A. Wagner,et al. Android permissions: user attention, comprehension, and behavior , 2012, SOUPS.
[26] Lorrie Faith Cranor,et al. A Conundrum of Permissions: Installing Applications on an Android Smartphone , 2012, Financial Cryptography Workshops.
[27] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[28] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[29] William Enck,et al. AppsPlayground: automatic security analysis of smartphone applications , 2013, CODASPY.
[30] Andrew Hunt,et al. Automated identification of installed malicious Android applications , 2013, Digit. Investig..
[31] Alaa M. Elsayad,et al. 2 . Material and Methods 2 . 1 Mammographic Masses Data Set , 2013 .
[32] Nicolas Christin,et al. Sweetening android lemon markets: measuring and combating malware in application marketplaces , 2013, CODASPY '13.
[33] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[34] Xiaojiang Du,et al. Permission-combination-based scheme for Android mobile malware detection , 2014, 2014 IEEE International Conference on Communications (ICC).