X-ANOVA ranked features for Android malware analysis
暂无分享,去创建一个
[1] Yoav Freund,et al. Experiments with a New Boosting Algorithm , 1996, ICML.
[2] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[3] Yajin Zhou,et al. Dissecting Android Malware: Characterization and Evolution , 2012, 2012 IEEE Symposium on Security and Privacy.
[4] Steve Hanna,et al. A survey of mobile malware in the wild , 2011, SPSM '11.
[5] Ian H. Witten,et al. The WEKA data mining software: an update , 2009, SKDD.
[6] Yajin Zhou,et al. Detecting repackaged smartphone applications in third-party android marketplaces , 2012, CODASPY '12.
[7] C. R. Kothari,et al. Research Methodology: Methods and Techniques , 2009 .
[8] Patrick D. McDaniel,et al. Understanding Android Security , 2009, IEEE Security & Privacy Magazine.
[9] Eul Gyu Im,et al. Android malware classification method: Dalvik bytecode frequency analysis , 2013, RACS.
[10] Chun-Ying Huang,et al. Performance Evaluation on Permission-Based Detection for Android Malware , 2013 .
[11] Andy Liaw,et al. Classification and Regression by randomForest , 2007 .
[12] Thorsten Holz,et al. Slicing droids: program slicing for smali code , 2013, SAC '13.
[13] Xuxian Jiang,et al. Catch Me If You Can: Evaluating Android Anti-Malware Against Transformation Attacks , 2014, IEEE Transactions on Information Forensics and Security.
[14] Yajin Zhou,et al. Hey, You, Get Off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets , 2012, NDSS.