InstDroid: A Light Weight Instant Malware Detector for Android Operating Systems
暂无分享,去创建一个
Saba Arshad | Muhammad Kamran Abbasi | M. A. Shah | Rabia Chaudhary | Munam Ali Shah | Neshmia Hafeez | Rabia Chaudhary | Saba Arshad | Neshmia Hafeez
[1] Shih-Hao Hung,et al. DroidDolphin: a dynamic Android malware detection framework using big data and machine learning , 2014, RACS '14.
[2] Eric Medvet,et al. Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection , 2016, IWSPA@CODASPY.
[3] Nello Cristianini,et al. An Introduction to Support Vector Machines and Other Kernel-based Learning Methods , 2000 .
[4] Aristide Fattori,et al. CopperDroid: Automatic Reconstruction of Android Malware Behaviors , 2015, NDSS.
[5] Abdullah Talha Kabakus,et al. APK Auditor: Permission-based Android malware detection system , 2015, Digit. Investig..
[6] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.
[7] Yong Wang,et al. Mobile malware security challeges and cloud-based detection , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).
[8] J. Thangakumar,et al. A cloud-based intrusion detection system for Android smartphones , 2012, 2012 International Conference on Radar, Communication and Computing (ICRCC).
[9] Saba Arshad,et al. Android Malware Detection & Protection: A Survey , 2016 .
[10] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[11] Qiaoyan Wen,et al. A cloud-based system for enhancing security of Android devices , 2012, 2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems.
[12] Shivakant Mishra,et al. Time and Location Power Based Malicious Code Detection Techniques for Smartphones , 2013, 2014 IEEE 13th International Symposium on Network Computing and Applications.
[13] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[14] Shivakant Mishra,et al. Power Based Malicious Code Detection Techniques for Smartphones , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[15] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[16] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[17] Gonzalo Álvarez,et al. PUMA: Permission Usage to Detect Malware in Android , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[18] Shigeki Goto,et al. Detecting Android Malware by Analyzing Manifest Files , 2013 .
[19] Qingzhong Liu,et al. Merging Permission and API Features for Android Malware Detection , 2016, 2016 5th IIAI International Congress on Advanced Applied Informatics (IIAI-AAI).
[20] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[21] Heng Yin,et al. DroidAPIMiner: Mining API-Level Features for Robust Malware Detection in Android , 2013, SecureComm.
[22] René Rydhof Hansen,et al. Formalisation and analysis of Dalvik bytecode , 2014, Sci. Comput. Program..
[23] Saman A. Zonouz,et al. A cloud-based intrusion detection and response system for mobile phones , 2011, 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W).
[24] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[25] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.