暂无分享,去创建一个
[1] Eibe Frank,et al. Logistic Model Trees , 2003, ECML.
[2] Elisa Bertino,et al. Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..
[3] Abhishek Kumar,et al. Improving the detection accuracy of unknown malware by partitioning the executables in groups , 2016, ArXiv.
[4] Goa Campus,et al. Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey , 2014 .
[5] Yajin Zhou,et al. RiskRanker: scalable and accurate zero-day android malware detection , 2012, MobiSys '12.
[6] Sanjay Kumar Sahay,et al. An effective approach for classification of advanced malware with high accuracy , 2016, ArXiv.
[7] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[8] João Gama,et al. Functional Trees , 2001, Machine Learning.
[9] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[10] Igor Santos,et al. On the automatic categorisation of android applications , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[11] L. Cranor,et al. Curbing Android Permission Creep , 2011 .
[12] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.
[13] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[14] Juan José Rodríguez Diez,et al. Rotation Forest: A New Classifier Ensemble Method , 2006, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[15] Sakir Sezer,et al. N-opcode analysis for android malware classification and categorization , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).
[16] Neeraj Bhargava,et al. Decision Tree Analysis on J48 Algorithm for Data Mining , 2013 .
[17] Ron Kohavi,et al. Scaling Up the Accuracy of Naive-Bayes Classifiers: A Decision-Tree Hybrid , 1996, KDD.
[18] Sanjay Kumar Sahay,et al. Grouping the executables to detect malware with high accuracy , 2016, ArXiv.
[19] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[20] Gianluca Dini,et al. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention , 2018, IEEE Transactions on Dependable and Secure Computing.
[21] Ian H. Witten,et al. WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[22] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[23] Radu State,et al. Using opcode-sequences to detect malicious Android applications , 2014, 2014 IEEE International Conference on Communications (ICC).
[24] Heng Yin,et al. DroidScope: Seamlessly Reconstructing the OS and Dalvik Semantic Views for Dynamic Android Malware Analysis , 2012, USENIX Security Symposium.
[25] Ali A. Ghorbani,et al. DroidKin: Lightweight Detection of Android Apps Similarity , 2014, SecureComm.
[26] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .