Machine Learning-Based Malicious Application Detection of Android
暂无分享,去创建一个
Jian Weng | Linfeng Wei | Zheng Yan | Weiqi Luo | Xiaoqian Zhang | Yanjun Zhong | Jian Weng | Weiqi Luo | Linfeng Wei | Xiaoqian Zhang | Zheng Yan | Yanjun Zhong
[1] Xiong Ping,et al. Android malware detection with contrasting permission patterns , 2014, China Communications.
[2] Ping Yan,et al. A survey on dynamic mobile malware detection , 2017, Software Quality Journal.
[3] Yuval Elovici,et al. “Andromaly”: a behavioral malware detection framework for android devices , 2012, Journal of Intelligent Information Systems.
[4] Xingquan Zhu,et al. Machine Learning for Android Malware Detection Using Permission and API Calls , 2013, 2013 IEEE 25th International Conference on Tools with Artificial Intelligence.
[5] Alan Said,et al. Predicting Vulnerability Exploits in the Wild , 2015, 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing.
[6] Tianqing Zhu,et al. Android malware detection with contrasting permission patterns , 2014 .
[7] Sam Malek,et al. Detection of Design Flaws in the Android Permission Protocol Through Bounded Verification , 2015, FM.
[8] Arvind Mahindru,et al. Dynamic Permissions based Android Malware Detection using Machine Learning Techniques , 2017, ISEC.
[9] Z. Rakamaric,et al. Android Malware Detection Based on System Calls , 2015 .
[10] Zheng Yan,et al. A hybrid approach of mobile malware detection in Android , 2017, J. Parallel Distributed Comput..
[11] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[12] Gonzalo Álvarez,et al. PUMA: Permission Usage to Detect Malware in Android , 2012, CISIS/ICEUTE/SOCO Special Sessions.
[13] Ninghui Li,et al. Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.
[14] Ayumu Kubota,et al. Kernel-based Behavior Analysis for Android Malware Detection , 2011, 2011 Seventh International Conference on Computational Intelligence and Security.
[15] Paul C. van Oorschot,et al. A methodology for empirical analysis of permission-based security models and its application to android , 2010, CCS '10.
[16] Yingjiu Li,et al. Permission based Android security: Issues and countermeasures , 2014, Comput. Secur..