메뉴 건너뛰기




Volumn , Issue , 2012, Pages 870-875

Mining permission request patterns from Android and Facebook applications

Author keywords

Android; Facebook; Pattern mining; Permissions; Smartphones; Unsupervised learning

Indexed keywords

ANDROID; ANDROID APPLICATIONS; API CALLS; BOOLEAN MATRIX; FACEBOOK; FACEBOOK APPLICATIONS; OR APPLICATIONS; OVERLAPPING CLUSTERS; PATTERN MINING; PERMISSIONS; PHONE CALLS; PRIVATE DATA; SECURITY MEASURE; THIRD PARTY APPLICATION (APPS); USER SATISFACTION;

EID: 84874080269     PISSN: 15504786     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDM.2012.86     Document Type: Conference Paper
Times cited : (74)

References (19)
  • 3
    • 78649990344 scopus 로고    scopus 로고
    • A methodology for empirical analysis of permission-based security models and its application to android
    • D. Barrera, H. G. u. c. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android," in ACM CCS '10.
    • ACM CCS '10
    • Barrera, D.1    Kayacik, H.G.U.C.2    Van Oorschot, C.P.3    Somayaji, A.4
  • 8
    • 85172622386 scopus 로고    scopus 로고
    • Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
    • Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in NDSS'2012.
    • NDSS'2012
    • Zhou, Y.1    Wang, Z.2    Zhou, W.3    Jiang, X.4
  • 9
    • 74049155830 scopus 로고    scopus 로고
    • On lightweight mobile phone application certification
    • W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," in ACM CCS'09.
    • ACM CCS'09
    • Enck, W.1    Ongtang, M.2    McDaniel, P.3
  • 10
    • 84874045003 scopus 로고    scopus 로고
    • Mining permission request patterns from android and facebook applications (extended author version)
    • vol. abs/1210.2429
    • M. Frank, B. Dong, A. P. Felt, and D. Song, "Mining permission request patterns from android and facebook applications (extended author version)," CoRR, vol. abs/1210.2429, 2012.
    • (2012) CoRR
    • Frank, M.1    Dong, B.2    Felt, A.P.3    Song, D.4
  • 12
    • 84874037662 scopus 로고    scopus 로고
    • SocialBakers - Apps on Facebook, http://www.socialbakers.com/facebook- applications.
  • 14
    • 0242625194 scopus 로고    scopus 로고
    • Role mining -revealing business roles for security administration using data mining technology
    • M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining -revealing business roles for security administration using data mining technology," in ACM SACMAT'03, pp. 179-186.
    • ACM SACMAT'03 , pp. 179-186
    • Kuhlmann, M.1    Shohat, D.2    Schimpf, G.3
  • 15
    • 77955190756 scopus 로고    scopus 로고
    • The role mining problem: A formal perspective
    • Jul
    • J. Vaidya, V. Atluri, and Q. Guo, "The role mining problem: A formal perspective," ACM Trans. Inf. Syst. Secur., vol. 13, no. 3, pp. 27:1-27:31, Jul. 2010.
    • (2010) ACM Trans. Inf. Syst. Secur. , vol.13 , Issue.3 , pp. 271-2731
    • Vaidya, J.1    Atluri, V.2    Guo, Q.3
  • 17
    • 2442611856 scopus 로고    scopus 로고
    • Stability-based validation of clustering solutions
    • T. Lange, V. Roth, M. L. Braun, and J. M. Buhmann, "Stability-based validation of clustering solutions," Neural Computation, vol. 16, pp. 1299-1323, 2004.
    • (2004) Neural Computation , vol.16 , pp. 1299-1323
    • Lange, T.1    Roth, V.2    Braun, M.L.3    Buhmann, J.M.4
  • 18
    • 80052419742 scopus 로고    scopus 로고
    • The minimum transfer cost principle for model-order selection
    • Springer
    • M. Frank, M. Chehreghani, and J. M. Buhmann, "The minimum transfer cost principle for model-order selection," in ECML PKDD '11. Springer, 2011, vol. 6911, pp. 423-438.
    • (2011) ECML PKDD '11 , vol.6911 , pp. 423-438
    • Frank, M.1    Chehreghani, M.2    Buhmann, J.M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.