Comparative Analysis of Feature Selection Methods and Machine Learning Algorithms in Permission based Android Malware Detection
暂无分享,去创建一个
P. Thangaraj | M. Nivaashini | R. S. Soundariya | H. Vidhya Shri | P. Thangaraj | M. Nivaashini | H. Vidhya Shri
[1] A. B. Gadicha,et al. Analysis of Malware Detection Techniques in Android , 2014 .
[2] S. Vijayarani,et al. Comparative Analysis of Bayes and Lazy Classification Algorithms , 2013 .
[3] Mahmut Ozer,et al. EEG signals classification using the K-means clustering and a multilayer perceptron neural network model , 2011, Expert Syst. Appl..
[4] Ali Selamat,et al. A Survey on Malware and Malware Detection Systems , 2013 .
[5] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[6] Sakir Sezer,et al. A New Android Malware Detection Approach Using Bayesian Classification , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).
[7] Ali Selamat,et al. A survey on malware propagation, analysis, and detection , 2013 .
[8] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[9] Igor Kononenko,et al. Estimating Attributes: Analysis and Extensions of RELIEF , 1994, ECML.
[10] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[11] Win Zaw,et al. Permission-Based Android Malware Detection , 2013 .
[12] P Ravi Kiran Varma,et al. Android mobile security by detecting and classification of malware based on permissions using machine learning algorithms , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).
[13] Richard E. Harang,et al. Rapid Permissions-Based Detection and Analysis of Mobile Malware Using Random Decision Forests , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[14] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[15] Shigeki Goto,et al. Detecting Android Malware by Analyzing Manifest Files , 2013 .
[16] Madihah Mohd Saudi,et al. An Efficient Framework to Build Up Malware Dataset , 2013 .
[17] J. Ross Quinlan,et al. C4.5: Programs for Machine Learning , 1992 .
[18] Sara Najari,et al. Malware Detection Using Data Mining Techniques , 2014 .
[19] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[20] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[21] Phaninder Reddy,et al. ANDROINSPECTOR: A SYSTEM FOR COMPREHENSIVE ANALYSIS OF ANDROID APPLICATIONS , 2015 .
[22] Cengiz Acartürk,et al. The analysis of feature selection methods and classification algorithms in permission based Android malware detection , 2014, 2014 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[23] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[24] Pat Langley,et al. Estimating Continuous Distributions in Bayesian Classifiers , 1995, UAI.