A neural network approach to category validation of Android applications
暂无分享,去创建一个
Yang Chen | T. Charles Clancy | Robert McGwier | Mo Ghorbanzadeh | Zhongmin Ma | T. Clancy | M. Ghorbanzadeh | R. McGwier | Yang Chen | Zhongmin Ma
[1] Mauro Conti,et al. CRePE: Context-Related Policy Enforcement for Android , 2010, ISC.
[2] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[3] Marko Helenius,et al. About malicious software in smartphones , 2006, Journal in Computer Virology.
[4] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[5] Byung-Gon Chun,et al. TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.
[6] Martin T. Hagan,et al. Gauss-Newton approximation to Bayesian learning , 1997, Proceedings of International Conference on Neural Networks (ICNN'97).
[7] Elie Bienenstock,et al. Neural Networks and the Bias/Variance Dilemma , 1992, Neural Computation.
[8] S. Grossberg. Neural Networks and Natural Intelligence , 1988 .
[9] David J. C. MacKay,et al. Bayesian Interpolation , 1992, Neural Computation.
[10] Teuvo Kohonen,et al. The self-organizing map , 1990 .
[11] Matthias Lange,et al. L4Android: a generic operating system framework for secure smartphones , 2011, SPSM '11.
[12] Xinwen Zhang,et al. Apex: extending Android permission model and enforcement with user-defined runtime constraints , 2010, ASIACCS '10.
[13] Herbert Bos,et al. Paranoid Android: versatile protection for smartphones , 2010, ACSAC '10.
[14] J. MacQueen. Some methods for classification and analysis of multivariate observations , 1967 .
[15] F.C. Freiling,et al. On the Effort to Create Smartphone Worms in Windows Mobile , 2007, 2007 IEEE SMC Information Assurance and Security Workshop.
[16] Yuriy Bulygin,et al. Epidemics of Mobile Worms , 2007, 2007 IEEE International Performance, Computing, and Communications Conference.
[17] Hao Chen,et al. Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone's Battery , 2006, 2006 Securecomm and Workshops.
[18] David A. Wagner,et al. Analyzing inter-application communication in Android , 2011, MobiSys '11.
[19] Patrick D. McDaniel,et al. On lightweight mobile phone application certification , 2009, CCS.
[20] Nachum Shacham,et al. Self-organizing networks , 1988, Future Gener. Comput. Syst..
[21] Alastair R. Beresford,et al. MockDroid: trading privacy for application functionality on smartphones , 2011, HotMobile '11.
[22] J. Foster,et al. SCanDroid: Automated Security Certification of Android , 2009 .