Research of android malware detection based on network traffic monitoring
暂无分享,去创建一个
Lidong Zhai | Jun Li | Xinyou Zhang | Daiyong Quan | Daiyong Quan | Jun Li | Lidong Zhai | Xinyou Zhang
[1] Guo Li. APT Threat Detection and Protection of Integrated Network Space , 2013 .
[2] Cui Xiang,et al. Survey of Botnets , 2011 .
[3] Liu Jiang,et al. SUPPORT VECTOR MACHINE TRAINING ALGORITHM: A REVIEW , 2002 .
[4] Bernhard E. Boser,et al. A training algorithm for optimal margin classifiers , 1992, COLT '92.
[5] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[6] Su Di-xin. Research of Smart Phone Malware Detection Based on Anomaly Data Flow Monitoring , 2012 .
[7] Zhilei Wang,et al. Control Method of Twitter- and SMS-Based Mobile Botnet , 2012, ISCTCS.
[8] Chih-Jen Lin,et al. LIBSVM: A library for support vector machines , 2011, TIST.
[9] Luo Xianghong and Shu Jiwu. Summary of Research for Erasure Code in Storage System , 2012 .
[10] Corinna Cortes,et al. Support-Vector Networks , 1995, Machine Learning.
[11] Dale C. Rowe,et al. A survey SCADA of and critical infrastructure incidents , 2012, RIIT '12.