暂无分享,去创建一个
[1] L. Cranor,et al. Curbing Android Permission Creep , 2011 .
[2] Abhishek Kumar,et al. Improving the detection accuracy of unknown malware by partitioning the executables in groups , 2016, ArXiv.
[3] Muttukrishnan Rajarajan,et al. Android Security: A Survey of Issues, Malware Penetration, and Defenses , 2015, IEEE Communications Surveys & Tutorials.
[4] Konrad Rieck,et al. DREBIN: Effective and Explainable Detection of Android Malware in Your Pocket , 2014, NDSS.
[5] Ali Feizollah,et al. AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection , 2017, Comput. Secur..
[6] Sanjay Kumar Sahay,et al. An investigation of the classifiers to detect android malicious apps , 2018, ArXiv.
[7] Sanjay Kumar Sahay,et al. An effective approach for classification of advanced malware with high accuracy , 2016, ArXiv.
[8] Radu State,et al. Using opcode-sequences to detect malicious Android applications , 2014, 2014 IEEE International Conference on Communications (ICC).
[9] Hahn-Ming Lee,et al. DroidMat: Android Malware Detection through Manifest and API Calls Tracing , 2012, 2012 Seventh Asia Joint Conference on Information Security.
[10] Muttukrishnan Rajarajan,et al. Employing Program Semantics for Malware Detection , 2015, IEEE Transactions on Information Forensics and Security.
[11] Sakir Sezer,et al. N-opcode analysis for android malware classification and categorization , 2016, 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security).
[12] Sanjay Kumar Sahay,et al. Group-Wise Classification Approach to Improve Android Malicious Apps Detection Accuracy , 2019, Int. J. Netw. Secur..
[13] Igor Santos,et al. On the automatic categorisation of android applications , 2012, 2012 IEEE Consumer Communications and Networking Conference (CCNC).
[14] Mark Stamp,et al. Static and Dynamic Analysis of Android Malware , 2017, ICISSP.
[15] Rahil Hosseini,et al. A state-of-the-art survey of malware detection approaches using data mining techniques , 2018, Human-centric Computing and Information Sciences.
[16] Yang Liu,et al. Adaptive and scalable Android malware detection through online learning , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[17] Ali Feizollah,et al. The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..
[18] Elisa Bertino,et al. Android resource usage risk assessment using hidden Markov model and online learning , 2017, Comput. Secur..
[19] Gianluca Dini,et al. MADAM: Effective and Efficient Behavior-based Android Malware Detection and Prevention , 2018, IEEE Transactions on Dependable and Secure Computing.
[20] Wei Zhang,et al. Semantics-Based Online Malware Detection: Towards Efficient Real-Time Protection Against Malware , 2016, IEEE Transactions on Information Forensics and Security.
[21] Kenneth Olmstead,et al. Apps permissions in the Google Play Store , 2015 .
[22] Goa Campus,et al. Evolution and Detection of Polymorphic and Metamorphic Malwares: A Survey , 2014 .
[23] Aziz Mohaisen,et al. Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information , 2016, Comput. Secur..
[24] Gerardo Canfora,et al. An HMM and structural entropy based detector for Android malware: An empirical study , 2016, Comput. Secur..
[25] Ke Xu,et al. ICCDetector: ICC-Based Malware Detection on Android , 2016, IEEE Transactions on Information Forensics and Security.
[26] K SahaySanjay,et al. Grouping the Executables to Detect Malwares with High Accuracy , 2016 .
[27] Thomas Schreck,et al. Mobile-sandbox: having a deeper look into android applications , 2013, SAC '13.
[28] Ankita Kapratwar. Static and Dynamic Analysis for Android Malware Detection , 2016 .
[29] Jacques Klein,et al. Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality , 2014, CODASPY '14.
[30] Avik Chaudhuri,et al. SCanDroid: Automated Security Certification of Android , 2009 .
[31] Elisa Bertino,et al. Detecting mobile malware threats to homeland security through static analysis , 2014, J. Netw. Comput. Appl..
[32] John C. S. Lui,et al. Droid Analytics: A Signature Based Analytic System to Collect, Extract, Analyze and Associate Android Malware , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.