A review on mobile threats and machine learning based detection approaches
暂无分享,去创建一个
[1] Hsinchun Chen,et al. Machine learning for attack vector identification in malicious source code , 2013, 2013 IEEE International Conference on Intelligence and Security Informatics.
[2] Baigal tugsSanjaa,et al. Malware detection using linear SVM , 2013, Ifost.
[3] Robert Shimonski,et al. Mobile Phone Tracking , 2015 .
[4] Aiman Abu Samra,et al. Analysis of Clustering Technique in Android Malware Detection , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[5] Mi-Jung Choi,et al. Linux kernel-based feature selection for Android malware detection , 2014, The 16th Asia-Pacific Network Operations and Management Symposium.
[6] Md. Rafiqul Islam,et al. An automated classification system based on the strings of trojan and virus families , 2009, 2009 4th International Conference on Malicious and Unwanted Software (MALWARE).
[7] Alva Erwin,et al. Analysis of Machine learning Techniques Used in Behavior-Based Malware Detection , 2010, 2010 Second International Conference on Advances in Computing, Control, and Telecommunication Technologies.
[8] Luke Rondeau. Mobile Device Vulnerabilities & Securities , 2014 .
[9] Yuval Elovici,et al. Automated Static Code Analysis for Classifying Android Applications Using Machine Learning , 2010, 2010 International Conference on Computational Intelligence and Security.
[10] Ainuddin Wahid Abdul Wahab,et al. A review on feature selection in mobile malware detection , 2015, Digit. Investig..
[11] Shanqing Guo,et al. Application of string kernel based support vector machine for malware packer identification , 2013, The 2013 International Joint Conference on Neural Networks (IJCNN).
[12] Christian Bauckhage,et al. Malware Detection on Mobile Devices Using Distributed Machine Learning , 2010, 2010 20th International Conference on Pattern Recognition.
[13] Assaf Neuberger,et al. Adware detection and privacy control in mobile devices , 2014, 2014 IEEE 28th Convention of Electrical & Electronics Engineers in Israel (IEEEI).
[14] Igor Santos,et al. Opcode sequences as representation of executables for data-mining-based unknown malware detection , 2013, Inf. Sci..
[15] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[16] Lior Rokach,et al. Novel active learning methods for enhanced PC malware detection in windows OS , 2014, Expert Syst. Appl..
[17] Elisa Bertino,et al. Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..
[18] Liwei Zhang,et al. Detecting Trojan horses based on system behavior using machine learning method , 2010, 2010 International Conference on Machine Learning and Cybernetics.
[19] Sheikh Iqbal Ahamed,et al. ePet: when cellular phone learns to recognize its owner , 2009, SafeConfig '09.
[20] Zane Markel,et al. Building a machine learning classifier for malware detection , 2014, 2014 Second Workshop on Anti-malware Testing Research (WATeR).
[21] Yuval Elovici,et al. Unknown malcode detection via text categorization and the imbalance problem , 2008, 2008 IEEE International Conference on Intelligence and Security Informatics.
[22] Latifur Khan,et al. A Machine Learning Approach to Android Malware Detection , 2012, 2012 European Intelligence and Security Informatics Conference.
[23] Luisa Verdoliva,et al. Iris liveness detection for mobile devices based on local descriptors , 2015, Pattern Recognit. Lett..
[24] Dragos Gavrilut,et al. Malware detection using machine learning , 2009, 2009 International Multiconference on Computer Science and Information Technology.
[25] Jack W. Stokes,et al. Large-scale malware classification using random projections and neural networks , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[26] John G. Iannarelli,et al. The Threats of Today and Tomorrow , 2015 .
[27] Hugo Proença,et al. Guest editorial introduction to the special executable issue on "Mobile Iris CHallenge Evaluation part I (MICHE I)" , 2015, Pattern Recognit. Lett..
[28] Md. Rafiqul Islam,et al. Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..
[29] Salvatore J. Stolfo,et al. Data mining methods for detection of new malicious executables , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[30] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[31] George Stanescu. Risk Assessment Model for Mobile Malware , 2015 .
[32] Timo Hämäläinen,et al. Support vector machine integrated with game-theoretic approach and genetic algorithm for the detection and classification of malware , 2013, 2013 IEEE Globecom Workshops (GC Wkshps).
[33] Karen Scarfone,et al. A standard for developing secure mobile applications , 2014, Comput. Stand. Interfaces.
[34] Sihan Qing,et al. A survey and trends on Internet worms , 2005, Comput. Secur..
[35] Mi-Jung Choi,et al. Analysis of Android malware detection performance using machine learning classifiers , 2013, 2013 International Conference on ICT Convergence (ICTC).
[36] Lior Rokach,et al. Improving malware detection by applying multi-inducer ensemble , 2009, Comput. Stat. Data Anal..
[37] Xinjian Chen,et al. A Fingerprint Authentication System Based on Mobile Phone , 2005, AVBPA.
[38] Simin Nadjm-Tehrani,et al. Crowdroid: behavior-based malware detection system for Android , 2011, SPSM '11.
[39] Alessandro Armando,et al. Security considerations related to the use of mobile devices in the operation of critical infrastructures , 2014, Int. J. Crit. Infrastructure Prot..
[40] P. V. Shijo,et al. Integrated Static and Dynamic Analysis for Malware Detection , 2015 .
[41] Yuval Elovici,et al. Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey , 2009, Inf. Secur. Tech. Rep..
[42] P. Vinod,et al. A machine learning approach for linux malware detection , 2014, 2014 International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT).
[43] Ping Wang,et al. Malware behavioural detection and vaccine development by using a support vector model classifier , 2015, J. Comput. Syst. Sci..