Security and Privacy
暂无分享,去创建一个
[1] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[2] Elisa Bertino,et al. TRBAC: a temporal role-based access control model , 2000, RBAC '00.
[3] Vijay Laxmi,et al. MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning Classifiers , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[4] Vijay Laxmi,et al. AndroSimilar: robust statistical feature signature for Android malware detection , 2013, SIN.
[5] Manachai Toahchoodee,et al. A Spatio-temporal Role-Based Access Control Model , 2007, DBSec.
[6] Ming Zeng,et al. Adaptive activity recognition with dynamic heterogeneous sensor fusion , 2014, 6th International Conference on Mobile Computing, Applications and Services.
[7] Shamik Sural,et al. Role Based Access Control with Spatiotemporal Context for Mobile Applications , 2009, Trans. Comput. Sci..
[8] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[9] Yanfang Ye,et al. Deep Neural Networks for Automatic Android Malware Detection , 2017, 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[10] Zhang Yi,et al. Some multistability properties of bidirectional associative memory recurrent neural networks with unsaturating piecewise linear transfer functions , 2009, Neurocomputing.
[11] David F. Ferraiolo,et al. Guide to Attribute Based Access Control (ABAC) Definition and Considerations , 2014 .
[12] Ravi S. Sandhu,et al. Role-Based Access Control Models , 1996, Computer.
[13] Vijay Laxmi,et al. Secure and efficient proof of ownership for deduplicated cloud storage , 2017, SIN.
[14] Vijay Laxmi,et al. Android component vulnerabities: Proof of concepts and mitigation , 2016, 2016 International Conference on Information Networking (ICOIN).
[15] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).
[16] Patrick Traynor,et al. A Large Scale Investigation of Obfuscation Use in Google Play , 2018, ACSAC.
[17] Zhenlong Yuan,et al. Droid-Sec: deep learning in android malware detection , 2015, SIGCOMM 2015.
[18] Vijay Laxmi,et al. Secure Random Encryption for Deduplicated Storage , 2017, ICISS.
[19] Xin Jin,et al. A Unified Attribute-Based Access Control Model Covering DAC, MAC and RBAC , 2012, DBSec.
[20] Muhammad Awais Shibli,et al. Towards Attribute-Centric Access Control: an ABAC versus RBAC argument , 2016, Secur. Commun. Networks.
[21] Mauro Conti,et al. Detecting Targeted Smartphone Malware with Behavior-Triggering Stochastic Models , 2014, ESORICS.
[22] Jay Dave,et al. Securing SQL with Access Control for Database as a Service Model , 2016, ICTCS.
[23] D. Elliott Bell,et al. Secure Computer System: Unified Exposition and Multics Interpretation , 1976 .
[24] Konstantin Berlin,et al. Deep neural network based malware detection using two dimensional binary program features , 2015, 2015 10th International Conference on Malicious and Unwanted Software (MALWARE).
[25] Vijay Laxmi,et al. DroidOLytics: Robust Feature Signature for Repackaged Android Apps on Official and Third Party Android Markets , 2013, 2013 2nd International Conference on Advanced Computing, Networking and Security.
[26] Xin Jin,et al. RABAC: Role-Centric Attribute-Based Access Control , 2012, MMM-ACNS.
[27] Xiong Luo,et al. Access Control Model Based on Role and Attribute and Its Implementation , 2016, 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC).
[28] Wei Li,et al. TAFC: Time and Attribute Factors Combined Access Control on Time-Sensitive Data in Public Cloud , 2014, 2015 IEEE Global Communications Conference (GLOBECOM).
[29] Ramaswamy Chandramouli,et al. The Queen's Guard: A Secure Enforcement of Fine-grained Access Control In Distributed Data Analytics Platforms , 2001, ACM Trans. Inf. Syst. Secur..
[30] Muttukrishnan Rajarajan,et al. Evaluation of Android Anti-malware Techniques against Dalvik Bytecode Obfuscation , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.
[31] Juan E. Tapiador,et al. Evolution, Detection and Analysis of Malware for Smart Devices , 2014, IEEE Communications Surveys & Tutorials.
[32] Gianluca Stringhini,et al. Eight Years of Rider Measurement in the Android Malware Ecosystem , 2018, IEEE Transactions on Dependable and Secure Computing.
[33] Vijayalakshmi Atluri,et al. Managing Multi-dimensional Multi-granular Security Policies Using Data Warehousing , 2015, NSS.
[34] Nitish Srivastava,et al. Dropout: a simple way to prevent neural networks from overfitting , 2014, J. Mach. Learn. Res..
[35] David M. Nicol,et al. A framework integrating attribute-based policies into role-based access control , 2012, SACMAT '12.
[36] Sylvia L. Osborn,et al. Current Research and Open Problems in Attribute-Based Access Control , 2017, ACM Comput. Surv..
[37] Ram Krishnan,et al. Attributes Enhanced Role-Based Access Control Model , 2015, TrustBus.
[38] Pietro Iglio,et al. Role templates for content-based access control , 1997, RBAC '97.
[39] D. Richard Kuhn,et al. Adding Attributes to Role-Based Access Control , 2010, Computer.
[40] Mansour Ahmadi,et al. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware , 2017, CODASPY.