Android malware family classification based on resource consumption over time
暂无分享,去创建一个
Roberto Baldoni | Leonardo Querzoni | Leonardo Aniello | Claudio Ciccotelli | Daniele Ucci | Luca Massarelli | R. Baldoni | Leonardo Aniello | Leonardo Querzoni | Luca Massarelli | Daniele Ucci | Claudio Ciccotelli
[1] Sankardas Roy,et al. Deep Ground Truth Analysis of Current Android Malware , 2017, DIMVA.
[2] Kang G. Shin,et al. Detecting energy-greedy anomalies and mobile malware variants , 2008, MobiSys '08.
[3] Isabelle Guyon,et al. An Introduction to Variable and Feature Selection , 2003, J. Mach. Learn. Res..
[4] Jules White,et al. Applying machine learning classifiers to dynamic Android malware detection at scale , 2013, 2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC).
[5] Christopher Krügel,et al. BareDroid: Large-Scale Analysis of Android Apps on Real Devices , 2015, ACSAC 2015.
[6] Matteo Pomilia. A study on obfuscation techniques for Android malware , 2016 .
[7] Mansour Ahmadi,et al. DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware , 2017, CODASPY.
[8] Ali Feizollah,et al. The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..
[9] Gaël Varoquaux,et al. Scikit-learn: Machine Learning in Python , 2011, J. Mach. Learn. Res..
[10] C. Peng,et al. Mosaic organization of DNA nucleotides. , 1994, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.
[11] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[12] Saed Alrabaee,et al. DySign: dynamic fingerprinting for the automatic detection of android malware , 2016, 2016 11th International Conference on Malicious and Unwanted Software (MALWARE).
[13] Roberto Baldoni,et al. Towards the Usage of Invariant-Based App Behavioral Fingerprinting for the Detection of Obfuscated Versions of Known Malware , 2016, 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies (NGMAST).
[14] Eric Medvet,et al. Acquiring and Analyzing App Metrics for Effective Mobile Malware Detection , 2016, IWSPA@CODASPY.
[15] K. Pearson. VII. Note on regression and inheritance in the case of two parents , 1895, Proceedings of the Royal Society of London.
[16] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[17] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[18] Ali A. Ghorbani,et al. DroidKin: Lightweight Detection of Android Apps Similarity , 2014, SecureComm.
[19] Lei Liu,et al. VirusMeter: Preventing Your Cellphone from Spies , 2009, RAID.
[20] Mansour Ahmadi,et al. DroidScribe: Classifying Android Malware Based on Runtime Behavior , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[21] Roberto Baldoni,et al. An Architecture for Semi-Automatic Collaborative Malware Analysis for CIs , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).
[22] L. Cavallaro,et al. A System Call-Centric Analysis and Stimulation Technique to Automatically Reconstruct Android Malware Behaviors , 2013 .