A Framework for Permission Recommendation and Risk Evaluation Based on Skewness-Based Filtering
暂无分享,去创建一个
Shizhan Chen | Zhiyong Feng | Keman Huang | Jinjing Han | Zhiyong Feng | Shizhan Chen | Keman Huang | Jinjing Han
[1] Jiannong Cao,et al. PriWe: Recommendation for Privacy Settings of Mobile Apps Based on Crowdsourced Users' Expectations , 2015, 2015 IEEE International Conference on Mobile Services.
[2] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[3] Tao Xie,et al. WHYPER: Towards Automating Risk Assessment of Mobile Applications , 2013, USENIX Security Symposium.
[4] Haoyu Wang,et al. Using text mining to infer the purpose of permission use in mobile apps , 2015, UbiComp.
[5] Alessandra Gorla,et al. Checking app behavior against app descriptions , 2014, ICSE.
[6] Sam Ransbotham,et al. Are Markets for Vulnerabilities Effective? , 2012, MIS Q..
[7] Jason Nieh,et al. A measurement study of google play , 2014, SIGMETRICS '14.
[8] Zhen Huang,et al. PScout: analyzing the Android permission specification , 2012, CCS.
[9] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[10] Zhong Chen,et al. AutoCog: Measuring the Description-to-permission Fidelity in Android Applications , 2014, CCS.
[11] P. Rousseeuw. Silhouettes: a graphical aid to the interpretation and validation of cluster analysis , 1987 .
[12] Yajin Zhou,et al. The impact of vendor customizations on android security , 2013, CCS.
[13] Úlfar Erlingsson,et al. Apples and Oranges: Detecting Least-Privilege Violators with Peer Group Analysis , 2015, ArXiv.
[14] Steve Hanna,et al. Android permissions demystified , 2011, CCS '11.