Android malware detection: An eigenspace analysis approach
暂无分享,去创建一个
[1] Gonzalo Álvarez,et al. PUMA: Permission Usage to Detect Malware in Android , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[2] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[3] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[4] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[5] M. Turk,et al. Eigenfaces for Recognition , 1991, Journal of Cognitive Neuroscience.
[6] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[7] Akanksha Sharma,et al. Mining API Calls and Permissions for Android Malware Detection , 2014, CANS.
[8] Mark Stamp,et al. Eigenvalue analysis for metamorphic detection , 2014, Journal of Computer Virology and Hacking Techniques.
[9] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[10] Sakir Sezer,et al. A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[11] Sakir Sezer,et al. Analysis of Bayesian classification-based approaches for Android malware detection , 2016, IET Inf. Secur..
[12] Siu-Ming Yiu,et al. DroidChecker: analyzing android applications for capability leak , 2012, WISEC '12.
[13] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[14] Eul Gyu Im,et al. Android malware classification method: Dalvik bytecode frequency analysis , 2013, RACS.
[15] Sakir Sezer,et al. Android Malware Detection Using Parallel Machine Learning Classifiers , 2014, 2014 Eighth International Conference on Next Generation Mobile Apps, Services and Technologies.
[16] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[17] Jiqiang Liu,et al. A Two-Layered Permission-Based Android Malware Detection Scheme , 2014, 2014 2nd IEEE International Conference on Mobile Cloud Computing, Services, and Engineering.
[18] Axelle Apvrille,et al. Reducing the window of opportunity for Android malware Gotta catch ’em all , 2012, Journal in Computer Virology.
[19] A. Baith Mohamed,et al. Eigenviruses for metamorphic virus recognition , 2011, IET Inf. Secur..