메뉴 건너뛰기




Volumn , Issue , 2010, Pages 329-333

Automated static code analysis for classifying android applications using machine learning

Author keywords

Android; Machine learning; Malware; Mobile devices; Security; Static analysis

Indexed keywords

ANDROID; APPLICATION FILES; CLASSIFICATION ALGORITHM; FILE TYPES; MACHINE LEARNING; MALWARES; SECURITY; STATIC CODE ANALYSIS; STATIC FEATURES; TEST COLLECTION;

EID: 79951646815     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2010.77     Document Type: Conference Paper
Times cited : (146)

References (30)
  • 1
    • 22944476745 scopus 로고    scopus 로고
    • Mobile phones: The next frontier for hackers?
    • N. Leavitt, "Mobile phones: the next frontier for hackers?" Computer, vol. 38(4), 2005, pp. 20-23.
    • (2005) Computer , vol.38 , Issue.4 , pp. 20-23
    • Leavitt, N.1
  • 3
    • 10644275203 scopus 로고    scopus 로고
    • Embedded devices next on the virus target list
    • M. Piercy, "Embedded devices next on the virus target list," IEEE Electronics Systems and Software, vol. 2, 2004, pp. 42-43.
    • (2004) IEEE Electronics Systems and Software , vol.2 , pp. 42-43
    • Piercy, M.1
  • 7
    • 77950673302 scopus 로고    scopus 로고
    • Securing Android-Powered Mobile Devices Using SELinux
    • May/June
    • A. Shabtai, Y. Fledel, Y. Elovici, "Securing Android-Powered Mobile Devices Using SELinux," IEEE Security and Privacy, vol. 8(3), May/June 2010, pp. 36-44.
    • (2010) IEEE Security and Privacy , vol.8 , Issue.3 , pp. 36-44
    • Shabtai, A.1    Fledel, Y.2    Elovici, Y.3
  • 8
    • 77953137615 scopus 로고    scopus 로고
    • Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method
    • A. Shabtai, U. Kanonov, Y. Elovici, "Intrusion Detection on Mobile Devices Using the Knowledge Based Temporal-Abstraction Method," Journal of Systems and Software, vol. 83(8), 2010, pp. 1524-1537.
    • (2010) Journal of Systems and Software , vol.83 , Issue.8 , pp. 1524-1537
    • Shabtai, A.1    Kanonov, U.2    Elovici, Y.3
  • 10
    • 44649187943 scopus 로고    scopus 로고
    • Is It Finally Time to Worry about Mobile Malware?
    • G. Lawton, "Is It Finally Time to Worry about Mobile Malware?," Computer, vol. 41(5), 2008, pp. 12-14.
    • (2008) Computer , vol.41 , Issue.5 , pp. 12-14
    • Lawton, G.1
  • 11
    • 63049091681 scopus 로고    scopus 로고
    • From desktop to mobile: Examining the security experience
    • R.A. Botha, S.M. Furnell, N.L. Clarke, "From desktop to mobile: Examining the security experience," Computer & Security, vol. 28, 2009, pp. 130-137.
    • (2009) Computer & Security , vol.28 , pp. 130-137
    • Botha, R.A.1    Furnell, S.M.2    Clarke, N.L.3
  • 15
    • 65749099969 scopus 로고    scopus 로고
    • Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey
    • A. Shabtai, R. Moskovitch, Y. Elovici, C. Glezer, "Detection of malicious code by applying machine learning classifiers on static features: A state-of-the-art survey," Information Security Technical Report, vol. 14(1), 2009, pp.16-29.
    • (2009) Information Security Technical Report , vol.14 , Issue.1 , pp. 16-29
    • Shabtai, A.1    Moskovitch, R.2    Elovici, Y.3    Glezer, C.4
  • 29
    • 0033569406 scopus 로고    scopus 로고
    • Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring
    • T. Golub, et al. "Molecular classification of cancer: Class discovery and class prediction by gene expression monitoring," Science, vol. 286, 1999, pp. 531-537.
    • (1999) Science , vol.286 , pp. 531-537
    • Golub, T.1
  • 30
    • 84856043672 scopus 로고
    • The mathematical theory of communication
    • C.E. Shannon, "The mathematical theory of communication," The Bell system Technical Journal, vol. 27(3), 1948, pp. 379-423.
    • (1948) The Bell System Technical Journal , vol.27 , Issue.3 , pp. 379-423
    • Shannon, C.E.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.