-
1
-
-
84867463760
-
-
Tech. Rep
-
A. P. Felt, E. Ha, S. Egelman, A. Haney, E. Chin, and D. Wagner, "Android Permissions: User Attention, Comprehension, and Behavior," Tech. Rep.
-
Android Permissions: User Attention, Comprehension, and Behavior
-
-
Felt, A.P.1
Ha, E.2
Egelman, S.3
Haney, A.4
Chin, E.5
Wagner, D.6
-
3
-
-
78649990344
-
A methodology for empirical analysis of permission-based security models and its application to android
-
D. Barrera, H. G. u. c. Kayacik, P. C. van Oorschot, and A. Somayaji, "A methodology for empirical analysis of permission-based security models and its application to android," in ACM CCS '10.
-
ACM CCS '10
-
-
Barrera, D.1
Kayacik, H.G.U.C.2
Van Oorschot, C.P.3
Somayaji, A.4
-
4
-
-
84861302816
-
Is this app safe? A large scale study on application permissions and risk signals
-
P. H. Chia, Y. Yamamoto, and N. Asokan, "Is this App Safe? A Large Scale Study on Application Permissions and Risk Signals," in Proceedings of the World Wide Web Conf., ser. WWW, 2012.
-
(2012)
Proceedings of the World Wide Web Conf., Ser. WWW
-
-
Chia, P.H.1
Yamamoto, Y.2
Asokan, N.3
-
5
-
-
80755172898
-
The effectiveness of application permissions
-
A. P. Felt, K. Greenwood, and D. Wagner, "The effectiveness of application permissions," in Proceedings of the USENIX Conf. on Web Application Development, ser. WebApps, 2011.
-
(2011)
Proceedings of the USENIX Conf. on Web Application Development, Ser. WebApps
-
-
Felt, A.P.1
Greenwood, K.2
Wagner, D.3
-
6
-
-
84860674786
-
On the automatic categorisation of android applications
-
B. Sanz, I. Santos, C. Laorden, X. Ugarte-Pedrero, and P. Bringas, "On the automatic categorisation of android applications," in Proceedings of the 9th IEEE Consumer Communications and Networking Conf. (CCNC), 2012.
-
(2012)
Proceedings of the 9th IEEE Consumer Communications and Networking Conf. (CCNC)
-
-
Sanz, B.1
Santos, I.2
Laorden, C.3
Ugarte-Pedrero, X.4
Bringas, P.5
-
8
-
-
85172622386
-
Hey, you, get off of my market: Detecting malicious apps in official and alternative android markets
-
Y. Zhou, Z. Wang, W. Zhou, and X. Jiang, "Hey, You, Get off of My Market: Detecting Malicious Apps in Official and Alternative Android Markets," in NDSS'2012.
-
NDSS'2012
-
-
Zhou, Y.1
Wang, Z.2
Zhou, W.3
Jiang, X.4
-
9
-
-
74049155830
-
On lightweight mobile phone application certification
-
W. Enck, M. Ongtang, and P. McDaniel, "On Lightweight Mobile Phone Application Certification," in ACM CCS'09.
-
ACM CCS'09
-
-
Enck, W.1
Ongtang, M.2
McDaniel, P.3
-
10
-
-
84874045003
-
Mining permission request patterns from android and facebook applications (extended author version)
-
vol. abs/1210.2429
-
M. Frank, B. Dong, A. P. Felt, and D. Song, "Mining permission request patterns from android and facebook applications (extended author version)," CoRR, vol. abs/1210.2429, 2012.
-
(2012)
CoRR
-
-
Frank, M.1
Dong, B.2
Felt, A.P.3
Song, D.4
-
12
-
-
84874037662
-
-
SocialBakers - Apps on Facebook, http://www.socialbakers.com/facebook- applications.
-
-
-
-
13
-
-
84857856090
-
Multiassignment clustering for Boolean data
-
Feb
-
M. Frank, A. P. Streich, D. Basin, and J. M. Buhmann, "Multiassignment clustering for Boolean data," Journal of Machine Learning Research, vol. 13, pp. 459-489, Feb 2012.
-
(2012)
Journal of Machine Learning Research
, vol.13
, pp. 459-489
-
-
Frank, M.1
Streich, A.P.2
Basin, D.3
Buhmann, J.M.4
-
14
-
-
0242625194
-
Role mining -revealing business roles for security administration using data mining technology
-
M. Kuhlmann, D. Shohat, and G. Schimpf, "Role mining -revealing business roles for security administration using data mining technology," in ACM SACMAT'03, pp. 179-186.
-
ACM SACMAT'03
, pp. 179-186
-
-
Kuhlmann, M.1
Shohat, D.2
Schimpf, G.3
-
15
-
-
77955190756
-
The role mining problem: A formal perspective
-
Jul
-
J. Vaidya, V. Atluri, and Q. Guo, "The role mining problem: A formal perspective," ACM Trans. Inf. Syst. Secur., vol. 13, no. 3, pp. 27:1-27:31, Jul. 2010.
-
(2010)
ACM Trans. Inf. Syst. Secur.
, vol.13
, Issue.3
, pp. 271-2731
-
-
Vaidya, J.1
Atluri, V.2
Guo, Q.3
-
17
-
-
2442611856
-
Stability-based validation of clustering solutions
-
T. Lange, V. Roth, M. L. Braun, and J. M. Buhmann, "Stability-based validation of clustering solutions," Neural Computation, vol. 16, pp. 1299-1323, 2004.
-
(2004)
Neural Computation
, vol.16
, pp. 1299-1323
-
-
Lange, T.1
Roth, V.2
Braun, M.L.3
Buhmann, J.M.4
-
18
-
-
80052419742
-
The minimum transfer cost principle for model-order selection
-
Springer
-
M. Frank, M. Chehreghani, and J. M. Buhmann, "The minimum transfer cost principle for model-order selection," in ECML PKDD '11. Springer, 2011, vol. 6911, pp. 423-438.
-
(2011)
ECML PKDD '11
, vol.6911
, pp. 423-438
-
-
Frank, M.1
Chehreghani, M.2
Buhmann, J.M.3
-
19
-
-
84869432690
-
Using probabilistic generative models for ranking risks of android apps
-
H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy, "Using Probabilistic Generative Models for Ranking Risks of Android Apps," in ACM CCS, 2012.
-
(2012)
ACM CCS
-
-
Peng, H.1
Gates, C.2
Sarma, B.3
Li, N.4
Qi, Y.5
Potharaju, R.6
Nita-Rotaru, C.7
Molloy, I.8
|